Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applications of Signcryption., and . Practical Signcryption, Springer, (2010)Non-contact time varying heart rate monitoring in exercise by video camera., , , , and . WCSP, page 1-5. IEEE, (2015)Adaptive tracking control of uncertain MIMO nonlinear systems based on generalized fuzzy hyperbolic model., , and . Fuzzy Sets and Systems, (2017)A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication., , , , and . IACR Cryptology ePrint Archive, (2006)Evaluation of Coverage and Mobility for URLLC via Outdoor Experimental Trials., , , , , , , , and . VTC Spring, page 1-5. IEEE, (2018)Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions., , , , and . IEICE Transactions, 92-A (1): 53-66 (2009)Optimal Transform Order of Fractional Fourier Transform for Decomposition of Overlapping Ultrasonic Signals., , and . IEICE Transactions, 97-A (1): 393-396 (2014)A Noniterative Frequency Estimator With Rational Combination of Three Spectrum Lines., and . IEEE Trans. Signal Processing, 59 (10): 5065-5070 (2011)Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack., , , and . PerCom Workshops, page 223-228. IEEE Computer Society, (2007)Adaptive control for a class of uncertain strict-feedback nonlinear systems based on a generalized fuzzy hyperbolic model., , , and . Fuzzy Sets and Systems, (2016)