Author of the publication

A New Method of Morphological Associative Memories.

, , , , and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 407-416. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of PS2 keyboard controller IP core based on SOPC., , and . EMEIT, page 4114-4117. IEEE, (2011)Certificate-based Smooth Projective Hashing and Its Applications., , and . Int. J. Netw. Secur., 20 (2): 266-277 (2018)On security of a certificateless signcryption scheme., , , and . Inf. Sci., (2013)Design of industrial robot controller based on system on programmable chip., , , and . EMEIT, page 3877-3880. IEEE, (2011)A Novel Texture Generation Super Resolution Model., , , , , and . ITQM, volume 162 of Procedia Computer Science, page 924-931. Elsevier, (2019)Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage., , , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 309-319. (2016)Remote medical video region tamper detection system based on Wireless Sensor Network., and . EAI Endorsed Trans. Pervasive Health Technol., 8 (31): 3 (2022)A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption., , , and . INCoS, page 342-346. IEEE, (2012)A New Method of Morphological Associative Memories., , , , and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 407-416. Springer, (2009)Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model., , , and . INCoS, page 329-333. IEEE, (2012)