Author of the publication

Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function.

, , , , and . Secur. Commun. Networks, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comments on "Sign/Logarithm Arithmetic for FFT Implementation''., and . IEEE Trans. Computers, 35 (5): 482-484 (1986)A Parametric Active Contour Model for Medical Image Segmentation Using Priori Shape Force Field., , , and . Journal of Computer Research and Development, 43 (12): 2131-2137 (2006)International Collaboration Activity Index: Case study of dye-sensitized solar cells., , , , , , and . J. Informetrics, 8 (4): 854-862 (2014)The Researches of Microscopic Image Segmentation and Recognition on the Cancer Cells Fallen into Peritoneal Effusion., , , , and . MIAR, page 253-258. IEEE Computer Society, (2001)Spatial-variant Image Filtering Based on Bidimensional Empirical Mode Decomposition., and . ICPR (2), page 1196-1199. IEEE Computer Society, (2006)CBR and Micro-Architecture Anti-Patterns Based Software Design Improvement., , , and . AIAI, volume 154 of IFIP, page 449-463. Kluwer/Springer, (2004)Dealing with NFRs for Smart-Phone Applications: A Goal-Oriented Approach., , and . SERA (selected papers), volume 430 of Studies in Computational Intelligence, page 113-125. Springer, (2012)Leader-follower consensus for multi-agent systems with three-layer network framework and dynamic interaction jointly connected topology., , , , , and . Neurocomputing, (2016)Composite thermally-induced focusing of a probe beam with Gaussian-distribution propagating through a cesium cell end-pumped by a LD., , , , , , , , , and 1 other author(s). WOCC, page 1-5. IEEE, (2016)Cost Sensitive Matrix Factorization for Face Recognition., , and . IDEAL, volume 10585 of Lecture Notes in Computer Science, page 136-145. Springer, (2017)