Author of the publication

A Range-Free Localization of Passive RFID Tags Using Mobile Readers.

, , , , and . MASS, page 445-446. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

the Connection between Cryptography and Differential Privacy: a Survey., , , and . CoRR, (2020)Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test., , , , , and . IEEE Access, (2018)Adaptive Robust Stabilization of a Flexible Timoshenko Manipulator., , , , , and . ICARM, page 565-569. IEEE, (2019)Improving Laplace Mechanism of Differential Privacy by Personalized Sampling., , , , , and . TrustCom, page 623-630. IEEE, (2020)The Trust Management Model of Trusted Software., , , and . IFITA (3), page 534-537. IEEE Computer Society, (2009)Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud., , , and . IEEE Access, (2019)A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System., , , , and . IACR Cryptol. ePrint Arch., (2024)Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients., , , and . HPCC/DSS/SmartCity, page 816-823. IEEE, (2020)Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions., , , , , and . J. Inf. Secur. Appl., (2021)An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection., , , and . IEEE Access, (2019)