Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Ternary Montgomery Ladder Algorithm on Elliptic Curves over GF(3^m)., , , and . I. J. Network Security, 21 (3): 384-391 (2019)A novel approach to achieve tunable dispersion compensation for optical generation and transmission of microwave signals., , , , and . WOCC, page 549-551. IEEE, (2013)Mutual Authentication in Wireless Mesh Networks., , , and . ICC, page 1690-1694. IEEE, (2008)On the Performance Prediction and Validation for Multisensor Fusion., and . CVPR, IEEE Computer Society, (2007)Phoney: protecting password hashes with threshold cryptology and honeywords., , and . IJES, 8 (2/3): 146-154 (2016)SSNF: Shared Datacenter Mechanism for Inter-datacenter Bulk Transfer., , and . CBD, page 184-189. IEEE Computer Society, (2014)A game-theoretic approach to sub-vertex registration., , , , and . Pattern Recognition Letters, (2016)Optical code scrambling technique for security enhancing in optical stealth system., , , , , and . WOCC, page 1-4. IEEE, (2016)Chi-square and SPRT combined fault detection for multisensor navigation., , , , and . IEEE Trans. Aerospace and Electronic Systems, 52 (3): 1352-1365 (2016)Learning Models for Predicting Recognition Performance., and . ICCV, page 1613-1618. IEEE Computer Society, (2005)