Author of the publication

Research and Application of RFID System Security Authentication Protocol Based on ECC Algorithm.

, and . HCC, volume 11354 of Lecture Notes in Computer Science, page 591-600. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Multiple-Deletion Multiple-Substitution Correcting Codes., , , and . ISIT, page 2655-2660. IEEE, (2021)On the design of spectrum shaping codes for high-density data storage., , , and . IEEE Trans. Consumer Electron., 63 (4): 477-482 (2017)Asymmetric Decentralized Caching With Coded Prefetching Under Nonuniform Requests., , , , and . IEEE Syst. J., 16 (1): 197-208 (2022)Optimal Single Chromosome-Inversion Correcting Codes for Data Storage in Live DNA., , , and . ISIT, page 1791-1796. IEEE, (2022)A New Version of q-Ary Varshamov-Tenengolts Codes With More Efficient Encoders: The Differential VT Codes and The Differential Shifted VT Codes., , and . IEEE Trans. Inf. Theory, 70 (10): 6989-7004 (October 2024)Non-binary LDPC code with multiple memory reads for multi-level-cell (MLC) flash., , and . APSIPA, page 1-9. IEEE, (2014)Iterative symbol-level detection and decoding for nonbinary LDPC coded 2D intersymbol interference channels., , and . ICC, page 407-411. IEEE, (2015)A union bound analysis for codes over binary asymmetric channels., , and . ICC, page 1-5. IEEE, (2017)Performance bounds for parity coded optical recording channels with d = 1 constraint., , and . ICC, page 2914-2918. IEEE, (2003)Two-write WOM-Codes for Non-Volatile Memories., , and . ISPACS, page 710-715. IEEE, (2012)