Author of the publication

A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications.

, , , and . Wirel. Pers. Commun., 114 (3): 2613-2627 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint logic programming for qualitative and quantitative constraint satisfaction problems., , and . Decis. Support Syst., 16 (1): 67-83 (1996)Primal-Dual and Primal Interior Point Algorithms for General Nonlinear Programs., , and . INFORMS J. Comput., 7 (3): 321-332 (1995)Reputation, Utility And Technological Innovation Strategies., , and . Int. J. Inf. Technol. Decis. Mak., 3 (1): 81-100 (2004)A two-stage stochastic programming approach for project planning with uncertain activity durations., , and . J. Sched., 10 (3): 167-180 (2007)A new method for indoor low-cost mobile robot SLAM., , , and . ICIA, page 1012-1017. IEEE, (2017)A Simple Baseline for Fast and Accurate Depth Estimation on Mobile Devices., , , , , and . CVPR Workshops, page 2466-2471. Computer Vision Foundation / IEEE, (2021)TACNet: Transition-Aware Context Network for Spatio-Temporal Action Detection., , , and . CVPR, page 11987-11995. Computer Vision Foundation / IEEE, (2019)SeaFormer: Squeeze-enhanced Axial Transformer for Mobile Semantic Segmentation., , , , and . ICLR, OpenReview.net, (2023)Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation., , , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 3-18. (2016)DetNet: Design Backbone for Object Detection., , , , , and . ECCV (9), volume 11213 of Lecture Notes in Computer Science, page 339-354. Springer, (2018)