Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis on Variation and Factors of Water Resources Consumption Intensity in China., , and . Modeling Risk Management for Resources and Environment in China, Springer, (2011)Universally composable anonymous Hash certification model., , and . Sci. China Ser. F Inf. Sci., 50 (3): 440-455 (2007)New and efficient conditional e-payment systems with transferability., , , , and . Future Gener. Comput. Syst., (2014)A Collaborative Self-Governing Privacy-Preserving Wireless Sensor Network Architecture Based on Location Optimization for Dynamic Service Discovery in MANET Environment., , and . Int. J. Distributed Sens. Networks, (2015)Efficient and privacy-preserving skyline computation framework across domains., , , , and . Future Gener. Comput. Syst., (2016)Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification., , , , and . IEEE J. Biomed. Health Informatics, 20 (2): 655-668 (2016)New Algorithms for Secure Outsourcing of Modular Exponentiations., , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 541-556. Springer, (2012)Continuous Authentication for the Internet of Things Using Channel State Information., , and . GLOBECOM, page 1-6. IEEE, (2019)Publicly verifiable database scheme with efficient keyword search., , , and . Inf. Sci., (2019)Privacy-preserving and high-accurate outsourced disease predictor on random forest., , , and . Inf. Sci., (2019)