Author of the publication

Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network.

, , , and . IJDSN, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Saturation-preserving specular reflection separation., , , and . CVPR, page 3725-3733. IEEE Computer Society, (2015)An Efficient Survivability Hierarchy Analysis Model for Networked Information System., , , , and . CIS, page 759-762. IEEE Computer Society, (2007)Agglomerative Hierarchical Co-clustering Based on Bregman Divergence., , , , and . SCDM, volume 287 of Advances in Intelligent Systems and Computing, page 389-398. Springer, (2014)Study of Index Weight in Network Threat Evaluation Based on Improved Grey Theory., , , , and . PACIIA (2), page 9-13. IEEE Computer Society, (2008)978-0-7695-3490-9.Anomaly Detection in Microblogging via Co-Clustering., , , , , and . J. Comput. Sci. Technol., 30 (5): 1097-1108 (2015)Optimizing Mean Reciprocal Rank for person re-identification., , , , and . AVSS, page 408-413. IEEE Computer Society, (2011)Approximation of Circular Arcs by C2 Cubic Polynomial B-splines., and . CAD/Graphics, page 417-420. IEEE, (2007)Locality-Constrained Collaborative Sparse Approximation for Multiple-Shot Person Re-identification., , and . ACPR, page 140-144. IEEE, (2013)Integrating a statistical background- foreground extraction algorithm and SVM classifier for pedestrian detection and tracking., , , , and . Integrated Computer-Aided Engineering, 20 (3): 201-216 (2013)Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation., , , and . Security and Communication Networks, 8 (18): 3356-3371 (2015)