Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ultra High Throughput Implementations for MD5 Hash Algorithm on FPGA., , , and . HPCA (China), volume 5938 of Lecture Notes in Computer Science, page 433-441. Springer, (2009)Two improvements in genetic programming for image classification., , and . IEEE Congress on Evolutionary Computation, page 2492-2497. IEEE, (2008)On Design of Blockchain-based Transport Scheme., , , and . BSCI, page 214-215. ACM, (2020)On Design of Single-Layer and Multilayer Code-Based Linkable Ring Signatures., , , and . IEEE Access, (2020)Blockchain-Based Proof of Retrievability Scheme., , , and . Secur. Commun. Networks, (2022)High Performance and Parallel Model for LU Decomposition on FPGAs., , , and . FCST, page 75-79. IEEE Computer Society, (2009)An efficient lattice-based linkable ring signature scheme with scalability to multiple layer., , and . J. Ambient Intell. Humaniz. Comput., 13 (3): 1547-1556 (2022)A novel authentication scheme based on edge computing for blockchain-based distributed energy trading system., , , and . EURASIP J. Wireless Comm. and Networking, 2020 (1): 152 (2020)View-Based 3D Model Retrieval by Joint Subgraph Learning and Matching., , , and . IEEE Access, (2020)Covert Communication in a Multirelay-Assisted Wireless Network With an Active Warden., , , , and . IEEE Internet Things J., 11 (9): 16450-16460 (May 2024)