Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 5.6MB/s 64Gb 4b/Cell NAND Flash memory in 43nm CMOS., , , , , , , , , and 47 other author(s). ISSCC, page 246-247. IEEE, (2009)A 19nm 112.8mm2 64Gb multi-level flash memory with 400Mb/s/pin 1.8V Toggle Mode interface., , , , , , , , , and 45 other author(s). ISSCC, page 422-424. IEEE, (2012)128Gb 3b/cell NAND flash memory in 19nm technology with 18MB/s write rate and 400Mb/s toggle mode., , , , , , , , , and 46 other author(s). ISSCC, page 436-437. IEEE, (2012)An efficient approach for mining sequential patterns using multiple threads on very large databases., , , , , and . Eng. Appl. of AI, (2018)Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model., , , and . AFRICACRYPT, volume 7918 of Lecture Notes in Computer Science, page 140-155. Springer, (2013)Identity-Based Trace and Revoke Schemes., and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 204-221. Springer, (2011)Multi-channel broadcast encryption., , and . AsiaCCS, page 277-286. ACM, (2013)Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices., , , and . Computer Communications, (2019)Forming Complicated Surface in Shipyard Using Neural Network System., , and . RiTA, volume 208 of Advances in Intelligent Systems and Computing, page 951-959. Springer, (2012)Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography., and . IACR Cryptology ePrint Archive, (2012)