Author of the publication

Group-based key array authentication protocol in radio frequency identification systems.

, , and . IET Inf. Secur., 8 (6): 290-296 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation Method of Online Learning Process Under the Background of Educational Big Data., and . eLEOT (2), volume 390 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 403-414. Springer, (2021)Data Mining Method of English Online Learning Behavior Based on Machine Learning Technology., and . eLEOT (1), volume 389 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 122-133. Springer, (2021)3D Neuron Microscopy Image Segmentation via the Ray-Shooting Model and a DC-BLSTM Network., , , , and . IEEE Trans. Medical Imaging, 40 (1): 26-37 (2021)A Framework of Multipath Clustering Based on Space-Transformed Fuzzy c-Means and Data Fusion for Radio Channel Modeling., , , , and . IEEE Trans. Veh. Technol., 69 (1): 4-15 (2020)Pathloss and Airframe Shadowing Loss of Air-to-Ground UAV Channel in the Airport Area at UHF- and L-Band., , , , , , and . IEEE Trans. Veh. Technol., 72 (6): 8094-8098 (June 2023)Top-Down Disconnectivity in Schizophrenia During P300 Tasks., , , , , , , , , and 1 other author(s). Frontiers Comput. Neurosci., (2018)Multiplatform collaborative detection resource scheduling method using K-means clustering algorithm and Hungarian algorithm., and . Concurr. Comput. Pract. Exp., (2021)MAUTH: Continuous User Authentication Based on Subtle Intrinsic Muscular Tremors., , , and . IEEE Trans. Mob. Comput., 23 (2): 1930-1941 (February 2024)On truthful auction mechanism for cloud resources allocation and consumption shifting with different time slots., , and . Concurr. Comput. Pract. Exp., (2021)Hybrid Interference Mitigation Using Analog Prewhitening., , , and . IEEE Trans. Wirel. Commun., 20 (10): 6595-6605 (2021)