Author of the publication

Design and Implementation of a Secure Prototype for EPCglobal Network Services.

, , , and . RFIDSec Asia, volume 8 of Cryptology and Information Security Series, page 45-56. IOS Press, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data., , , and . Privacy in Statistical Databases, volume 6344 of Lecture Notes in Computer Science, page 1-16. Springer, (2010)EDA: an enhanced dual-active algorithm for location privacy preservation inmobile P2P networks., , , , and . Journal of Zhejiang University - Science C, 14 (5): 356-373 (2013)Joint affinity aware grouping and virtual machine placement., , , , , , and . Microprocess. Microsystems, (2017)Rare Category Detection Forest., , , and . KSEM, volume 9403 of Lecture Notes in Computer Science, page 612-618. Springer, (2015)Evaluation of local community metrics: from an experimental perspective., , , and . J. Intell. Inf. Syst., 51 (1): 1-22 (2018)Rare category exploration., , , , and . Expert Syst. Appl., 41 (9): 4197-4210 (2014)Discovery of Regional Co-location Patterns with k-Nearest Neighbor Graph., , , , and . PAKDD (1), volume 7818 of Lecture Notes in Computer Science, page 174-186. Springer, (2013)An Approach to Automated Runtime Verification for Timed Systems: Applications to Web Services., , , and . J. Softw., 7 (6): 1338-1350 (2012)Scheduling and Routing of AMOs in an Intelligent Transport System., and . IEEE Trans. Intell. Transp. Syst., 10 (3): 547-552 (2009)Unsupervised analysis of top-k core members in poly-relational networks., , , , and . Expert Syst. Appl., 41 (13): 5689-5701 (2014)