Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of Double Length Compression Function Based on Block Cipher., , and . I. J. Network Security, 4 (2): 121-127 (2007)Web Service Discovery with UDDI Based on Semantic Similarity of Service Properties., , and . SKG, page 454-457. IEEE Computer Society, (2007)Analysis of All-or-Nothing Hash Functions., , , and . J. Inf. Sci. Eng., 24 (5): 1473-1484 (2008)Analysis of Zipper as a Hash Function., , , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 392-403. Springer, (2008)Convertible Multi-authenticated Encryption Scheme for Data Communication., , and . I. J. Network Security, 17 (1): 40-48 (2015)To avoid or not to avoid CSI leakage in physical layer secret communication systems., , , , and . IEEE Communications Magazine, 53 (12): 19-25 (2015)An IP-based packet test environment for TD-LTE and LTE FDD., and . IEEE Communications Magazine, 52 (3): 97-103 (2014)Auction based spectrum sharing for hybrid access in macro-femtocell networks under QoS requirements., , , and . ICC, page 3335-3340. IEEE, (2015)On optimal artificial-noise assisted secure beamforming for the fading eavesdropper channel., , , and . PIMRC, page 1167-1171. IEEE, (2011)Six-dimensional free-viewpoint synthesis flow for QFHD free-viewpoint/multiview 3DTV applications., , , and . ICME, page 1-4. IEEE Computer Society, (2011)