Author of the publication

A Physiological Authentication Scheme in Secure Healthcare Sensor Networks.

, , and . SECON, page 1-3. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Construction and Development Strategy of Cross-border E-commerce Ecosystem in Era of Digital Economy.. ICETT, page 60-65. ACM, (2021)Generalized fair reachability analysis for cyclic protocols: part 1., and . PSTV, volume 1 of IFIP Conference Proceedings, page 271-286. Chapman & Hall, (1994)Calibrating Human Hand for Teleoperating the HIT/DLR Hand., , , , and . ICRA, page 4571-4576. IEEE, (2004)Generative Adversarial Networks Based Industrial Protocol Construction in the Fog Computing., and . LCN, page 453-456. IEEE, (2018)A new method of detecting human eyelids based on deformable templates., , and . SMC (1), page 604-609. IEEE, (2004)An improved K-view algorithm for image texture classification using new characteristic views selection methods., , , and . SAC, page 959-963. ACM, (2010)Dual-branch residual network for lung nodule segmentation., , , , , , , and . CoRR, (2019)A Method for Measurement of Absolute Angular Position and Application in a Novel Electromagnetic Encoder System., , , , and . J. Sensors, (2015)The Cloud Model Based on Grey System Theory and Application on Effectiveness Evaluation., , and . ICIC (1), volume 7995 of Lecture Notes in Computer Science, page 31-38. Springer, (2013)Web Text Categorization for Enterprise Decision Support Based on SVMs - An Application of GBODSS., , , and . ISNN (2), volume 5552 of Lecture Notes in Computer Science, page 753-762. Springer, (2009)