Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prevention of Information Leakage by Photo-Coupling in Smart Card., and . IEICE Transactions, 91-A (1): 160-167 (2008)A Novel Stream Cipher with Hash Function for the RFID Device., , , and . IMIS, page 532-536. IEEE Computer Society, (2011)The Delay Analysis in a Noisy General Cut-Through Switching Network., , and . Computer Networks and ISDN Systems, 26 (2): 185-194 (1993)The performance evaluation of fast iterative localized re-authentication for 3G/UMTS-WLAN interworking networks., , and . J. Ambient Intelligence and Humanized Computing, 4 (2): 209-221 (2013)A fast iterative localized re-authentication protocol for UMTS-WLAN heterogeneous mobile communication networks., , and . EURASIP J. Wireless Comm. and Networking, (2011)Closed-Form Statistical Analysis for Square Law PN Acquisition. Detector Performance in Spread Spectrum Systems., and . ICC, page 271-275. IEEE, (1986)Concurrent Error Detection in Shifted Dual Basis Multiplier over GF(2m) Using Cyclic Code Approach., , and . AINA Workshops, page 234-239. IEEE Computer Society, (2010)Solving Scalability Problems on Secure RFID Grouping-Proof Protocol., , , and . Wireless Personal Communications, 84 (2): 1069-1088 (2015)Identity-Based Key Agreement for Peer Group Communication from Pairings., , and . IEICE Transactions, 88-A (10): 2762-2768 (2005)A fast iterative localized re-authentication protocol for heterogeneous mobile networks., , and . IEEE Trans. Consumer Electronics, 56 (4): 2267-2275 (2010)