Author of the publication

An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme.

, , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital IP protection using threshold voltage control., , , , and . ISQED, page 344-349. IEEE, (2016)Design Considerations for Energy-Efficient and Variation-Tolerant Nonvolatile Logic., , and . IEEE Trans. Very Large Scale Integr. Syst., 26 (12): 2628-2640 (2018)Quantifying causal effects from observed data using quasi-intervention., , , , , , and . BMC Medical Informatics Decis. Mak., 22 (1): 337 (2022)Hierarchical Representation for Multi-view Clustering: From Intra-sample to Intra-view to Inter-view., , , , , and . CIKM, page 2362-2371. ACM, (2022)Integration of threshold logic gates with RRAM devices for energy efficient and robust operation., , , and . NANOARCH, page 39-44. IEEE Computer Society/ACM, (2014)Toward Few-Label Vertical Federated Learning., , , , , , and . ACM Trans. Knowl. Discov. Data, 18 (7): 176 (August 2024)The Network Pharmacological Mechanism of Yizhiningshen Oral Liquid in the Treatment of Tic Disorders., , , , , , and . BIBM, page 3856-3863. IEEE, (2021)Tensor Completion via Complementary Global, Local, and Nonlocal Priors., , , , , and . IEEE Trans. Image Process., (2022)An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Threshold Logic in a Flash., , , , and . ICCD, page 550-558. IEEE, (2019)