Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A-peer: An Agent Platform Integrating Peer-to-Peer Network., , and . CCGRID, page 614-617. IEEE Computer Society, (2003)Efficient Key Assignment Scheme for Mobile Agent Systems., , and . ICTAI, page 338-345. IEEE Computer Society, (2003)Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme., and . PIMRC, page 1-6. IEEE, (2008)An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks., , and . VTC Spring, page 831-835. IEEE, (2006)Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents., , and . ICICS, volume 2836 of Lecture Notes in Computer Science, page 22-33. Springer, (2003)Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol., and . ARES, page 238-245. IEEE Computer Society, (2007)An optimal location update and searching algorithm for tracking mobile agent., and . AAMAS, page 639-646. ACM, (2002)Achieving high security and efficiency in RFID-tagged supply chains., , , , and . IJACT, 2 (1): 3-12 (2010)A Security and Performance Evaluation of Hash-Based RFID Protocols., , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 406-424. Springer, (2008)Time Constraint Delegation for P2P Data Decryption.. SPC, volume 2802 of Lecture Notes in Computer Science, page 173-186. Springer, (2003)