From post

A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.

, , , , и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 451-464. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tools and Benchmarks for Automated Log Parsing., , , , , , и . CoRR, (2018)ThreshoWeb Security and Data Managementld Signature Scheme Based on Modular Secret Sharing., , и . CIS (2), стр. 442-445. IEEE Computer Society, (2008)978-0-7695-3508-1.FaceCloak: An Architecture for User Privacy on Social Networking Sites., , и . CSE (3), стр. 26-33. IEEE Computer Society, (2009)Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks., , , , и . ISBAST, IEEE, (2013)The Design and Research of the Internet of Things Technology in the Training of Spatial Navigation Ability of Patients with Mild Cognitive Impairment., , , , , , , , , и . CSE/EUC (2), стр. 305-309. IEEE Computer Society, (2017)Standardized Research of Clinical Diagnosis and Treatment Data of Epilepsy., , , , , , , , , и . IHSED, том 1026 из Advances in Intelligent Systems and Computing, стр. 760-766. Springer, (2019)Construction of national clinical research data center of Traditional Chinese medicine., , , , и . Healthcom, стр. 47-51. IEEE, (2012)Practical research of conceptual system framework based on TCM basic theory., , , и . Healthcom, стр. 357-360. IEEE, (2012)Real-world clinical data mining on TCM clinical diagnosis and treatment: A survey., , , , и . Healthcom, стр. 88-93. IEEE, (2012)Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules., , и . RSKT, том 4062 из Lecture Notes in Computer Science, стр. 604-609. Springer, (2006)