Author of the publication

Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard.

, , , and . WCNC, page 1870-1875. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Content Location Privacy Preserving in Social Network Travel Image Sharing., , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 617-628. Springer, (2020)Federated CF: Privacy-Preserving Collaborative Filtering Cross Multiple Datasets., , , and . ICC, page 1-6. IEEE, (2020)Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks., , , , , and . ICC, page 1-6. IEEE, (2019)Cooperative Computation Offloading and Resource Allocation for Blockchain-Enabled Mobile-Edge Computing: A Deep Reinforcement Learning Approach., , , , , and . IEEE Internet Things J., 7 (7): 6214-6228 (2020)A Proximity-Based Concurrent Access Strategy to Improve Throughput in VANETs., , , , , and . IJDSN, (2013)An Automated Black-box Testing Approach for WSN Security Protocols., , , , and . CIS, page 693-697. IEEE Computer Society, (2011)Anonymous Communication in Wireless Mesh Network., , , and . CIS (2), page 416-420. IEEE Computer Society, (2009)978-0-7695-3931-7.FSVM: Federated Support Vector Machines for Smart City., , , , and . TRIDENTCOM, volume 489 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 149-167. Springer, (2022)DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security., , , , , and . WISEC, page 222-232. ACM, (2022)Research on the Resilience of Key Management in Sensor Networks., , and . CIS, page 716-720. IEEE Computer Society, (2007)