Author of the publication

A Varying Pulse Width Second Order Derivative Gaussian Pulse Generator for UWB Transceivers in CMOS.

, , , , , , and . ISCAS, page 2794-2797. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks., , , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 448-461. Springer, (2014)A Traffic Video Background Extraction Algorithm Based on Image Content Sensitivity., , , , and . ICSI (2), volume 6146 of Lecture Notes in Computer Science, page 603-610. Springer, (2010)How to improve students' intrinsic motivation and 4C skills in the virtual e-learning community and evaluate its results., and . ICETC, page 158-162. ACM, (2022)Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme)., , , , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 531-540. Springer, (2006)When E-learning Meets Web 3.0: Applications and Challenges., and . ICEIT, page 332-336. IEEE, (2023)Efficient group key management for secure big data in predictable large-scale networks., , , , and . Concurr. Comput. Pract. Exp., 28 (4): 1174-1192 (2016)Privacy Protection Method Based on Access Control., , , , and . APSIPA, page 254-259. IEEE, (2018)Provably secure one-round identity-based authenticated asymmetric group key agreement protocol., , , and . Inf. Sci., 181 (19): 4318-4329 (2011)A Scalable Cross-Chain Access Control and Identity Authentication Scheme., , , , , and . Sensors, 23 (4): 2000 (February 2023)Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures., , , , , and . Peer-to-Peer Netw. Appl., 11 (2): 235-251 (2018)