Author of the publication

Authentication Protocol for Distributed Cloud Computing: An Explanation of the Security Situations for Internet-of-Things-Enabled Devices.

, , , , and . IEEE Consumer Electronics Magazine, 7 (6): 38-44 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profile human-induced vegetation change in ArHorqin banner of China using time series datasets., , , and . IGARSS, page 1107-1110. IEEE, (2017)The credit analysis of transportation capacity supply chain finance based on core enterprise credit radiation., , and . J. Intell. Fuzzy Syst., 40 (6): 10811-10824 (2021)Adaptive Extension Fitting Scheme: An Effective Curve Approximation Method Using Piecewise Bézier Technology., , and . IEEE Access, (2023)Distributed resilient filtering of large-scale systems with channel scheduling., , and . Kybernetika, 56 (1): 170-188 (2020)A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks., , , and . Comput. Electr. Eng., (2015)Knowledge graph for TCM health preservation: Design, construction, and applications., , , , , , , and . Artif. Intell. Medicine, (2017)Modeling and tracking Covid-19 cases using Big Data analytics on HPCC system platformm., , , , , , and . J. Big Data, 8 (1): 33 (2021)A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof., , , , and . Secur. Commun. Networks, 8 (18): 3847-3863 (2015)Miner Fatigue Detection from Electroencephalogram-Based Relative Power Spectral Topography Using Convolutional Neural Network., , and . Sensors, 23 (22): 9055 (November 2023)An efficient calibration technique for pipeline ADC., , , and . MWSCAS, page 669-672. IEEE, (2013)