Author of the publication

A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy.

, , , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 987-995. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key management scheme using secret sharing for multi-device based DRM., , , , , and . ICCE, page 384-385. IEEE, (2012)Traffic information system: A lightweight geocast-based piggybacking strategy for cooperative awareness in VANET., , , , and . ICCE, page 614-615. IEEE, (2013)Pose-Invariant Face Detection Using Edge-Like Blob Map and Fuzzy Logic., , , , and . IEA/AIE, volume 3533 of Lecture Notes in Computer Science, page 695-704. Springer, (2005)MetaVRain: A Mobile Neural 3-D Rendering Processor With Bundle-Frame-Familiarity-Based NeRF Acceleration and Hybrid DNN Computing., , , , , and . IEEE J. Solid State Circuits, 59 (1): 65-78 (January 2024)Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds., , , , , and . CloudCom (1), page 439-444. IEEE Computer Society, (2013)Encoding Speaker-Specific Latent Speech Feature for Speech Synthesis., , , , , , , and . CoRR, (2023)A 54.7 fps 3D Point Cloud Semantic Segmentation Processor with Sparse Grouping Based Dilated Graph Convolutional Network for Mobile Devices., , , and . ISCAS, page 1-5. IEEE, (2020)A 161.6 TOPS/W Mixed-mode Computing-in-Memory Processor for Energy-Efficient Mixed-Precision Deep Neural Networks., , , , , and . ISCAS, page 365-369. IEEE, (2022)Speaker Adaptation of Various Components in Deep Neural Network based Speech Synthesis., , and . SSW, page 153-159. ISCA, (2016)Using a Non-prior Training Active Feature Model., , , , , , , and . PCM (3), volume 3333 of Lecture Notes in Computer Science, page 69-78. Springer, (2004)