Author of the publication

RFID Privacy Protection Scheme for Secure Ubiquitous Computing.

, , and . IWRT, page 117-124. INSTICC PRESS, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Verification of Cryptographic Protocol for Secure RFID System., , , , and . NCM (2), page 470-477. IEEE Computer Society, (2008)978-0-7695-3322-3.Heart and Lung Sound Measurement Using an Esophageal Stethoscope with Adaptive Noise Cancellation., , , , , and . Sensors, 21 (20): 6757 (2021)Deep-Learning-Based Automatic Selection of Fewest Channels for Brain-Machine Interfaces., , and . IEEE Trans. Cybern., 52 (9): 8668-8680 (2022)An online top-down SSVEP-BMI for augmented reality., , , , , and . BCI, page 1-3. IEEE, (2019)A Smartphone-Based Automatic Diagnosis System for Facial Nerve Palsy., , , and . Sensors, 15 (10): 26756-26768 (2015)Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol., , and . HPCC, page 1015-1018. IEEE Computer Society, (2008)Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System., , and . ICDCS Workshops, page 217-223. IEEE Computer Society, (2005)The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing., and . DEXA Workshops, page 693-697. IEEE Computer Society, (2007)Learning Time-Frequency Representations of Phonocardiogram for Murmur Detection., , , , and . CinC, page 1-4. IEEE, (2022)Real-time apnea-hypopnea event detection during sleep by convolutional neural networks., , , , , , , and . Comput. Biol. Medicine, (2018)