Author of the publication

A Comparative Survey on RFID Grouping Authentication Protocols.

, , , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 982-993. IOS Press, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Location-Aware Routing Protocol for Underwater Sensor Networks., , , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 609-617. Springer, (2013)Functional Verification of the Equator MAP1000 Microprocessor., , , , , , , and . DAC, page 169-174. ACM Press, (1999)New Upper Bounds For The Bondage Number Of A Graph In Terms Of Its Maximum Degree And Euler Characteristic., and . Ars Comb., (2018)A RFID Based Localization Algorithm for Wireless Sensor Networks., , , , and . ICCCS (2), volume 10040 of Lecture Notes in Computer Science, page 275-285. (2016)A new lower bound on error probability for nonuniform signals over AWGN channels., , and . WCNC, page 3005-3009. IEEE, (2013)Written Texts as Statistical Mechanical Problem., , and . ICTIR, volume 5766 of Lecture Notes in Computer Science, page 241-248. Springer, (2009)Discrete Branch Length Representations for Genetic Algorithms in Phylogenetic Search., and . EvoWorkshops, volume 3005 of Lecture Notes in Computer Science, page 94-103. Springer, (2004)Outsourced data tagging via authority and delegable auditing for cloud storage., , , and . ICCST, page 131-134. IEEE, (2015)The study of interference effect in a globally coupled quantum network., , , and . Quantum Inf. Process., 18 (7): 205 (2019)Towards Efficient and Unbiased Implementation of Lipschitz Continuity in GANs., , , , and . CoRR, (2019)