Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Limiting Integral Loop Digital Control for DC-DC Converters Subject to Changes in Load Current and Source Voltage., , , and . IEEE Trans. Industrial Informatics, 10 (2): 1307-1316 (2014)The Simulation of VRML Based Manipulator and Techniques., , and . PACIIA (2), page 949-953. IEEE Computer Society, (2008)978-0-7695-3490-9.A Lightweight Fast Handover Authentication Scheme in Mobile Networks., , , and . ICC, page 1-5. IEEE, (2009)Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose Mechanism., and . CIS (1), page 446-450. IEEE Computer Society, (2009)Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing., , , and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 384-395. Springer, (2009)Critical Analysis of New Protocols on Lightweight Authentication., and . APCC, page 325-330. IEEE, (2018)Efficient Group Signatures from Bilinear Pairing., , , and . CISC, volume 3822 of Lecture Notes in Computer Science, page 128-139. Springer, (2005)Cooperation in wireless ad hoc networks: a market-based approach., and . IEEE/ACM Trans. Netw., 13 (6): 1325-1338 (2005)Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6., , , and . VTC Spring, page 828-830. IEEE, (2006)Tracing Stateful Pirate Decoders., , and . ICC, page 1-5. IEEE, (2009)