Author of the publication

Trusted Computing-Based Security Architecture For 4G Mobile Networks.

, , , and . PDCAT, page 251-255. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Addressing Stability in Classifier Explanations., , , , and . IEEE BigData, page 1920-1927. IEEE, (2021)An ID-based group signature., , and . InfoSecu, page 229-230. ACM, (2004)High Speed H.264 High Profile Deblocking using Statistical Analysis and Logic Optimization., , , , and . ICME, page 1918-1921. IEEE Computer Society, (2007)Low-rate hybrid Wyner-Ziv coding of Laplace-Markov source using uniform scalar quantization., , and . ICASSP, page 1121-1124. IEEE, (2008)Rateless Slepian-Wolf Coding Based on Rate Adaptive Low-Density-Parity-Check Codes., , and . ISIT, page 1316-1320. IEEE, (2007)Transform coefficient coding design for AVS2 video coding standard., , , and . VCIP, page 1-6. IEEE, (2013)Side Information Generation for Distributed Video Coding., , and . ICIP (2), page 13-16. IEEE, (2007)A Sequential Graph Convolutional Network with Frequency-domain Complex Network of EEG Signals for Epilepsy Detection., , , , , and . BIBM, page 785-792. IEEE, (2020)Password-Based Tripartite Key Exchange Protocol with Forward Secrecy., , and . RSKT, volume 5009 of Lecture Notes in Computer Science, page 731-738. Springer, (2008)A New Chameleon Multi-signature Based on Bilinear Pairing., and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 329-334. Springer, (2004)