Author of the publication

Lightweight security for mobile commerce transactions.

, , , and . Computer Communications, 26 (18): 2052-2060 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic Analysis of Programmable Logic Controllers., , , , , and . IEEE Trans. Computers, 63 (10): 2563-2575 (2014)Lightweight security for mobile commerce transactions., , , and . Computer Communications, 26 (18): 2052-2060 (2003)Gn blending multiple surfaces in polar coordinates., , , and . Computer-Aided Design, 42 (6): 479-494 (2010)Automatic G1 arc spline interpolation for closed point set., , , and . Computer-Aided Design, 36 (12): 1205-1218 (2004)Shape control of swept surface with profiles., and . Computer-Aided Design, 33 (12): 893-902 (2001)Heuristic-Guided Abstraction Refinement., , , and . Comput. J., 52 (3): 280-287 (2009)Overlap-free Karatsuba-Ofman polynomial multiplication algorithms., , , and . IET Information Security, 4 (1): 8-14 (2010)An octree-based proxy for collision detection in large-scale particle systems., , , and . SCIENCE CHINA Information Sciences, 56 (1): 1-10 (2013)A Hierachical Method for Wiring and Congestion Prediction., , , , , , and . ISVLSI, page 307-308. IEEE Computer Society, (2005)Improving Test Quality of Scan-Based BIST by Scan Chain Partitioning., , , and . Asian Test Symposium, page 12-17. IEEE Computer Society, (2003)