Author of the publication

Emerging services and technologies in wireless networks.

, , and . J. High Speed Networks, 21 (2): 81-82 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Emerging services and technologies in wireless networks., , and . J. High Speed Networks, 21 (2): 81-82 (2015)Secure Subway Train-to-Train Communications via GSM-R Communication Systems., , , and . VTC Spring, page 1-5. IEEE, (2016)POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords., , , , , and . ACM Conference on Computer and Communications Security, page 1457-1459. ACM, (2014)POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results., , , , , and . ACM Conference on Computer and Communications Security, page 1460-1462. ACM, (2014)Verifiable Computation on Outsourced Encrypted Data., , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 273-291. Springer, (2014)Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations., , , , and . Inf. Sci., (2020)The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions., , , and . TCC (1), volume 9014 of Lecture Notes in Computer Science, page 7-35. Springer, (2015)Identity-Embedding Method for Decentralized Public-Key Infrastructure., , , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 1-14. Springer, (2014)Adaptable Ciphertext-Policy Attribute-Based Encryption., , , and . Pairing, volume 8365 of Lecture Notes in Computer Science, page 199-214. Springer, (2013)Multiple Watermarking Using Multilevel Quantization Index Modulation., , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 312-326. (2016)