Author of the publication

Efficient Integrity Authentication Scheme for Large-Scale RFID Systems.

, , , , , and . IEEE Trans. Mob. Comput., 22 (9): 5216-5230 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Seamless handoff scheme in Wi-Fi and WiMAX heterogeneous networks., , and . Future Gener. Comput. Syst., 26 (8): 1403-1408 (2010)Detection of Superpoints Using a Vector Bloom Filter., , , and . IEEE Trans. Inf. Forensics Secur., 11 (3): 514-527 (2016)Pota: Maximizing Profit for Task-Level Scheduling for Data Center Networks., , , , and . CIT/IUCC/DASC/PICom, page 1230-1237. IEEE, (2015)TINA: A Fair Inter-datacenter Transmission Mechanism with Deadline Guarantee., , , , and . INFOCOM, page 2017-2025. IEEE, (2020)A Low Transmission Overhead Framework of Mobile Visual Search Based on Vocabulary Decomposition., , , , and . IEEE Trans. Multim., 16 (7): 1963-1972 (2014)Shaping Deadline Coflows to Accelerate Non-Deadline Coflows., , , and . IWQoS, page 1-6. IEEE, (2018)Cloud Resource Provision of Competitive Content Providers: Models and Analysis., , , and . ISPA/BDCloud/SocialCom/SustainCom, page 53-60. IEEE, (2019)Federated Learning in Smart Cities: A Comprehensive Survey., , , , , and . CoRR, (2021)Openflow Based Dynamic Flow Scheduling with Multipath for Data Center Networks., , , , , and . Comput. Syst. Sci. Eng., 33 (4): 251-258 (2018)Hash Ranking With Weighted Asymmetric Distance for Image Search., , , and . IEEE Trans. Computational Imaging, 3 (4): 1008-1019 (2017)