Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-stamp based mutual authentication protocol for mobile RFID system., , and . WOCC, page 702-706. IEEE, (2013)New Classes of Ternary Bent Functions from the Coulter-Matthews Bent Functions., , and . CoRR, (2017)HTTP-sCAN: Detecting HTTP-flooding attaCk by modeling multi-features of web browsing behavior from noisy dataset., , , , and . APCC, page 677-682. IEEE, (2013)Cross-layer collaborative interconnecting for multi-domain software defined optical network., , , , and . CITS, page 157-160. IEEE, (2017)Circular-shift linear network coding., , , , and . ISIT, page 2383-2387. IEEE, (2017)An efficient authentication protocol for low-cost RFID system in the prensence of malicious readers., and . FSKD, page 2111-2114. IEEE, (2012)New Classes of Ternary Bent Functions From the Coulter-Matthews Bent Functions., , and . IEEE Trans. Inf. Theory, 64 (6): 4653-4663 (2018)Features extraction and analysis for device-free human activity recognition based on channel statement information in b5G wireless communications., , , , , and . EURASIP J. Wireless Comm. and Networking, 2020 (1): 36 (2020)On Vector Linear Solvability of Multicast Networks., , , , and . IEEE Trans. Commun., 64 (12): 5096-5107 (2016)A novel segment-shared protection algorithm based on dynamic domain-sequencing scheme for multi-domain optical mesh networks., , , , and . Photonic Netw. Commun., 22 (3): 276-287 (2011)