Author of the publication

Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method.

, , , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 1073-1080. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel CRM PFC Control Method for Reducing inductor., , , and . Journal of Circuits, Systems, and Computers, (2014)On Inconclusive Verdict in Conformance Testing., and . Protocol Test Systems, volume C-11 of IFIP Transactions, page 81-92. North-Holland, (1992)An Integration of Biometrics and Mobile Computing for Personal Identification., , , and . ICAPR (2), volume 3687 of Lecture Notes in Computer Science, page 226-235. Springer, (2005)Homomorphic modulation spectra., , and . ICASSP (2), page 761-764. IEEE, (2004)Time-variant least squares harmonic modeling., and . ICASSP (2), page 41-44. IEEE, (2003)Generating Closed Frequent Itemsets with the Frequent Pattern List., and . DBTA, page 1-4. IEEE, (2010)Multiscale retinal vessel segmentation with precise width estimation., , , and . ICCH, page 1-4. IEEE, (2012)Experiments of Soil Moisture Retrieval based on Extended Kalman Filter., , and . IGARSS (2), page 690-693. IEEE, (2009)A protein detection POCT device based on microfluidic immunoassay chips., , , , , , and . BMEI, page 328-332. IEEE, (2015)The Feature Vector Mapping of Process Plant's Topology Structure Based on Statistical Learning., , , and . CCIS, page 521-531. IEEE, (2018)