Author of the publication

Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G.

, , , , , and . Int. J. Communication Systems, 29 (16): 2375-2387 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Loop scheduling and bank type assignment for heterogeneous multi-bank memory., , , , , and . J. Parallel Distrib. Comput., 69 (6): 546-558 (2009)Thermal Modeling and Management of Storage Systems in Data Centers., , , , , and . Handbook on Data Centers, Springer, (2015)Efficient Pattern Detection for Embedded Optical Bio-sensing System., , , , and . DASC, page 259-266. IEEE Computer Society, (2011)Three-Phase Algorithms for Task Scheduling in Distributed Mobile DSP System with Lifetime Constraints., , , , , and . Signal Processing Systems, 67 (3): 239-253 (2012)Static Security Optimization for Real Time Systems., , , , , , and . IEEE Trans. Industrial Informatics, 5 (1): 22-37 (2009)Energy-aware routing for delay-sensitive underwater wireless sensor networks., , , and . SCIENCE CHINA Information Sciences, 57 (10): 1-14 (2014)Extending Amdahl's law and Gustafson's law by evaluating interconnections on multi-core processors., , , , and . The Journal of Supercomputing, 66 (1): 305-319 (2013)Wear-leveling for PCM main memory on embedded system via page management and process scheduling., , , , and . RTCSA, page 1-9. IEEE Computer Society, (2014)An LOF-Based Adaptive Anomaly Detection Scheme for Cloud Computing., , , , , , and . COMPSAC Workshops, page 206-211. IEEE Computer Society, (2013)User-Level Side Channel Attack on Workflow System in Data-Center., , , , and . HPCC/CSS/ICESS, page 1430-1435. IEEE, (2015)