Author of the publication

Towards scalable key management for secure multicast communication.

, , and . ITC, 41 (2): 173-182 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep semi-supervised learning for domain adaptation., and . MLSP, page 1-6. IEEE, (2015)Multiple Scan Trees Synthesis for Test Time/Data and Routing Length Reduction under Output Constraint., , and . Asian Test Symposium, page 231-236. IEEE Computer Society, (2009)Single-Cell Electric Lysis on an Electroosmotic-Driven Microfluidic Chip with Arrays of Microwells., , , , and . Sensors, 12 (6): 6967-6977 (2012)A System-Level Model of Design Space Exploration for a Tile-Based 3D Graphics SoC Refinement., , , and . IEICE Transactions, 92-A (12): 3193-3202 (2009)A content-centric framework for effective data dissemination in opportunistic networks., , , , and . IEEE Journal on Selected Areas in Communications, 26 (5): 761-772 (2008)The Design of Background Subtraction on Reconfigurable Hardware., and . IIH-MSP, page 182-185. IEEE, (2012)Charge Balance Control for Improving the Load Transient Response on Dynamic Voltage Scaling(DVS) Buck Converter., and . ISCAS, page 1-5. IEEE, (2018)Building robust models for small data containing nominal inputs and continuous outputs based on possibility distributions., , and . Int. J. Machine Learning & Cybernetics, 10 (10): 2805-2822 (2019)Finding Self-Similarities in Opportunistic People Networks., , , , , , and . INFOCOM, page 2286-2290. IEEE, (2007)Small-diamond-based search algorithm for fast block motion estimation., , and . Sig. Proc.: Image Comm., 22 (10): 877-890 (2007)