Author of the publication

Probabilistic Analysis of Blocking Attack in RFID Systems.

, , , , and . IEEE Trans. Inf. Forensics Secur., 6 (3-1): 803-817 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Expander graphs and codes., and . Algebraic Coding Theory and Information Theory, volume 68 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 57-68. DIMACS/AMS, (2003)Reducing Communication Overhead of Key Distribution Schemes for Wireless Sensor Networks., and . ICCCN, page 1345-1350. IEEE, (2007)Approximations for the probability in the tails of the binomial distribution., and . IEEE Trans. Inf. Theory, 33 (3): 426-428 (1987)Addresses for graphs., and . IEEE Trans. Inf. Theory, 19 (5): 683-688 (1973)Coding with Permutations, , and . Inf. Control., 43 (1): 1-19 (October 1979)VSH and multiplicative modular relations between small primes with polynomial exponents., , and . Appl. Algebra Eng. Commun. Comput., 25 (3): 181-188 (2014)On Short Cycle Enumeration in Biregular Bipartite Graphs., and . IEEE Trans. Inf. Theory, 64 (10): 6526-6535 (2018)On the Trellis Complexity of the Densest Lattice Packings in Rn., and . SIAM J. Discret. Math., 9 (4): 597-601 (1996)LDPC and Gallager codes over finite fields., and . Handbook of Finite Fields, CRC Press, (2013)Raptor codes., and . Handbook of Finite Fields, CRC Press, (2013)