Author of the publication

Dynamic Authentication-Key Re-assignment for Reliable Report Delivery.

, , and . MASS, page 467-476. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic Stacked BMS Using Low-side MOSFET Control Architecture., , , , , , and . ICCE-Taiwan, page 181-182. IEEE, (2023)Welding seam detection and feature point extraction for robotic arc welding using laser-vision., , , , and . URAI, page 644-647. IEEE, (2016)A path-planning algorithm of the automatic welding robot system for three-dimensional arc welding using image processing., , , and . URAI, page 692-697. IEEE, (2016)Towards Graph-hop Retrieval and Reasoning in Complex Question Answering over Textual Database., , , , , , and . LREC/COLING, page 16539-16549. ELRA and ICCL, (2024)MoDE-CoTD: Chain-of-Thought Distillation for Complex Reasoning Tasks with Mixture of Decoupled LoRA-Experts., , , , , , , , and . LREC/COLING, page 11475-11485. ELRA and ICCL, (2024)Very Long Baseline Interferometry with the SKA, , , , , , , , , and 72 other author(s). (Dec 18, 2014)Health and climate change: policy responses to protect public health, , , , , , , , , and 35 other author(s). The Lancet, (Sep 17, 2015)Model of Collaborative UAV Swarm Toward Coordination and Control Mechanisms Study., , and . ICCS, volume 51 of Procedia Computer Science, page 493-502. Elsevier, (2015)Locating Compromised Sensor Nodes Through Incremental Hashing Authentication., , , and . DCOSS, volume 4026 of Lecture Notes in Computer Science, page 321-337. Springer, (2006)Content-based retrieval of FlashTM movies: research issues, generic framework, and future directions., , , and . Multimedia Tools Appl., 34 (1): 1-23 (2007)