Author of the publication

On the Security of a Mutual Authentication and Key Agreement Protocol Based on Chaotic Maps.

, , , , and . RVSP, page 143-146. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A high noise recognition system with self-organizing features., , and . ICNN, page 2121-2125. IEEE, (1995)Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments., , , and . IEEE Access, (2019)Test Methodology for Defect-based Bridge Faults., , , , , , , , and . ITC-Asia, page 106-111. IEEE, (2020)A 250Mb/s-to-3.4Gb/s HDMI receiver with adaptive loop updating frequencies and an adaptive equalizer., , , , , , , and . ISSCC, page 190-191. IEEE, (2009)A framework of deep reinforcement learning for stock evaluation functions., , and . J. Intell. Fuzzy Syst., 38 (5): 5639-5649 (2020)A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment., , , , , and . Veh. Commun., (February 2023)On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks., , , , and . J. Univers. Comput. Sci., 21 (3): 406-418 (2015)AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (11): 22607-22618 (2022)Study on Secrecy Capacity of Wireless Sensor Networks in Internet of Things Based on the Amplify-and-Forward Compressed Sensing Scheme., , , , , , and . IEEE Access, (2019)Transferability of Adversarial Attacks on Tiny Deep Learning Models for IoT Unmanned Aerial Vehicles., , , , , , and . IEEE Internet Things J., 11 (12): 21037-21045 (June 2024)