Author of the publication

A Quantum Identity Authentication Protocol Based on Optical Transmission & Face Recognition.

, , , , , and . Int. J. Online Eng., 14 (4): 58-69 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coordinating preventive lateral transshipment between two locations., , and . Computers & Industrial Engineering, 66 (4): 933-943 (2013)Microarray analysis of gene expression during auditory hair cell regeneration in zebrafish (Danio rerio)., , , and . BMC Bioinformatics, (2008)Microarray analysis and quantitative real-time PCR validation of gene expression during auditory hair cell regeneration in zebrafish (Danio rerio)., , , , , and . BMC Bioinformatics, (2009)An intelligent traffic light control approach for reducing vehicles CO2 emissions in VANET., , , and . FSKD, page 2070-2075. IEEE, (2015)Hysteresis automatic configuration for outbound handover in heterogeneous small cell networks., , , and . FSKD, page 2127-2131. IEEE, (2015)A three-dimensional localization method in severe non-line-of-sight environment with lacking arrival angle., , , and . PIMRC, page 2099-2104. IEEE, (2015)Application of Chaotic Phase Space Reconstruction into Nonlinear Time Series Prediction in Deep Rock Mass., , , and . FSKD (5), page 593-597. IEEE Computer Society, (2008)978-0-7695-3305-6.Requirement Risk Assessment Focused-On Stakeholder Risk Analysis., and . COMPSAC (1), page 640-641. IEEE Computer Society, (2009)Normalized-Mutual-Information-Based Mining Method for Cascading Patterns., , , and . ISPRS Int. J. Geo-Information, 5 (10): 174 (2016)A Declarative Service-Based Method for Adaptive Aggregation of Sensor Streams., , , , , and . IEEE Access, (2019)