Author of the publication

Legitimate-reader-only attack on MIFARE Classic.

, , , and . Mathematical and Computer Modelling, 58 (1-2): 219-226 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Heterogeneous Recovery Rates against SIS Epidemics in Directed Networks., , and . CoRR, (2014)The Accuracy of Mean-Field Approximation for Susceptible-Infected-Susceptible Epidemic Spreading with Heterogeneous Infection Rates., and . COMPLEX NETWORKS, volume 693 of Studies in Computational Intelligence, page 499-510. Springer, (2016)Research on image segmentation algorithm based on fuzzy clustering.. ICDIP, volume 8878 of SPIE Proceedings, page 88784I. SPIE, (2013)Mining Top-n Local Outliers in Constrained Spatial Networks., , , and . ADMA, volume 5139 of Lecture Notes in Computer Science, page 725-732. Springer, (2008)Spatio-Temporal Changes in Vegetation Activity and Its Driving Factors during the Growing Season in China from 1982 to 2011., , , and . Remote Sensing, 7 (10): 13729-13752 (2015)A Temporal Dominant Relationship Analysis Method., , , , and . ADMA, volume 5139 of Lecture Notes in Computer Science, page 367-378. Springer, (2008)Deep semantic understanding of high resolution remote sensing image., , , and . CITS, page 1-5. IEEE, (2016)Weighted Discriminator Function Based Unambiguous Tracking Method for Dual-Frequency Constant Envelope Modulated Signals., , , , , , and . Wireless Personal Communications, 103 (3): 1895-1925 (2018)SIS Epidemic Spreading with Heterogeneous Infection Rates., and . CoRR, (2015)The optimization of road building schedule based on budget restriction., and . Kybernetes, 38 (3/4): 441-447 (2009)