Author of the publication

A Lightweight RFID Security Protocol Based on Elliptic Curve Crytography.

, , and . I. J. Network Security, 18 (2): 354-361 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Entropy Based Method for Network Anomaly Detection., , and . PRDC, page 189-191. IEEE Computer Society, (2009)Improved Edit Distance Method for System Call Anomaly Detection., , , and . CIT, page 1097-1102. IEEE Computer Society, (2012)Opportunistic Scheduling and Performance Analysis on Wireless Network Coding., , , and . CIT, page 491-498. IEEE Computer Society, (2011)A model of cloud data secure storage based on HDFS., , , and . ICIS, page 173-178. IEEE Computer Society, (2013)Grid-based high performance ensemble classification for evolving data stream., , , and . Concurrency and Computation: Practice and Experience, 28 (16): 4339-4351 (2016)A multi-layer information dispersal based encryption algorithm and its application for access control., , , and . SUSCOM, (2018)Efficiency Priority Schedule Mechanism with Network Coding in Wireless Networks., , , and . CIT, page 381-386. IEEE Computer Society, (2014)Android Malware Identification Through Visual Exploration of Disambly Files., and . I. J. Network Security, 20 (6): 1061-1073 (2018)The Comparison of the Relative Entropy for Intrusion Detection on CPU and GPU., , , and . ACIS-ICIS, page 141-146. IEEE Computer Society, (2010)Opportunistic wireless Network Coding based on small-time scale Traffic Prediction., , , and . ICIS, page 59-64. IEEE Computer Society, (2015)