Author of the publication

A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management.

, , , , , and . IEEE Internet Things J., 10 (20): 17656-17665 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Topology control in lossy wireless sensor networks with delay constraint., , , and . WCNC, page 958-963. IEEE, (2013)Three-dimensional Forest growth simulation in virtual geographic environments., , , , and . Earth Sci. Informatics, 12 (1): 31-41 (2019)Residual energy aware mobile data gathering in wireless sensor networks., , , and . Telecommun. Syst., 62 (1): 31-41 (2016)Joint subcarrier and power allocation with fairness in uplink OFDMA systems based on ant colony optimization., , , and . Int. J. Commun. Syst., 27 (10): 1505-1521 (2014)A Novel Bus Lane Enforcement System with Vehicular Sensor Networks., , , , , and . WCNC, page 1-5. IEEE, (2010)DTN Routing in Vehicular Sensor Networks., , , , and . GLOBECOM, page 752-756. IEEE, (2008)Performance Evaluation of Vehicle-Based Mobile Sensor Networks for Traffic Monitoring., , , , , and . IEEE Trans. Veh. Technol., 58 (4): 1647-1653 (2009)Two-stream Multi-focus Image Fusion Based on the Latent Decision Map., , , , and . ICASSP, page 1762-1766. IEEE, (2019)Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map., , , and . Signal Process., (2018)A Metropolitan Taxi Mobility Model from Real GPS Traces., , , , and . J. Univers. Comput. Sci., 18 (9): 1072-1092 (2012)