Author of the publication

How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs.

, , , , and . IEEE Trans. Inf. Forensics Secur., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UMPCA Based Feature Extraction for ECG., , , and . ISNN (1), volume 7951 of Lecture Notes in Computer Science, page 383-390. Springer, (2013)Remote data possession checking with privacy-preserving authenticators for cloud storage., , , , , and . Future Gener. Comput. Syst., (2017)An Energy Scheduling Strategy With Priority Within Islanded Microgrids., , , , , and . IEEE Access, (2019)Modelling Multi-Exit Large-Venue Pedestrian Evacuation With Dual-Strategy Adaptive Particle Swarm Optimization., , , and . IEEE Access, (2020)Blockchain-based two-party fair contract signing scheme., , , and . Inf. Sci., (2020)A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication., , , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 240-250. Springer, (2018)Action density based frame sampling for human action recognition in videos., , , , , and . J. Vis. Commun. Image Represent., (February 2023)Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures., , , , and . J. Comput. Syst. Sci., (2021)A cloud computing based system for cyber security management., , , , , , and . Int. J. Parallel Emergent Distributed Syst., 30 (1): 29-45 (2015)Research on Reliability-Centered Maintenance Strategy of Container Terminal Shore Crane., , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 603-610. IEEE, (2020)