Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study on Secure and Effcient Sensor Network Management Scheme Using PTD., and . ICCSA (3), volume 3045 of Lecture Notes in Computer Science, page 1020-1028. Springer, (2004)Secure RFID authentication scheme for EPC class Gen2., , and . ICUIMC, page 221-227. ACM, (2009)Secure authentication and management scheme for RFID., , and . Q2SWinet, page 106-110. ACM, (2008)A Study on Key Recovery Agent Protection Profile Having Composition Function., , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 557-566. Springer, (2004)A Study on Secure SDP of RFID Using Bluetooth Communication., , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 117-126. Springer, (2005)Secure Bluetooth Piconet Using Non-anonymous Group Key., , , and . EurAsia-ICT, volume 2510 of Lecture Notes in Computer Science, page 766-777. Springer, (2002)A Study on Improved RFID Authentication Scheme., , , , , and . MUE, page 567-572. IEEE Computer Society, (2007)A Study on Scalable Bluetooth Piconet for Secure Ubiquitous., , and . Human.Society@Internet, volume 3597 of Lecture Notes in Computer Science, page 45-56. Springer, (2005)Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure., , , , and . IEEE Trans. Vehicular Technology, 60 (7): 3408-3423 (2011)Decentralized Aggregation Design and Study of Federated Learning., , , , and . SmartWorld/SCALCOM/UIC/ATC/IOP/SCI, page 328-337. IEEE, (2021)