Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated verification of dynamic root of trust protocols (long version)., , and . CoRR, (2017)Post-quantum Key Escrow for Supervised Secret Data Sharing on Consortium Blockchain., , , , , , and . CSS, volume 13172 of Lecture Notes in Computer Science, page 164-181. Springer, (2021)Post-Quantum User Authentication and Key Exchange Based on Consortium Blockchain., , , , , and . ICPADS, page 667-674. IEEE, (2021)RAS2P: Remote Attestation via Self-Measurement for SGX-based Platforms., , , , , and . SMC, page 2085-2092. IEEE, (2022)Electric Vehicle Trip Information Inference Based on Time-Series Residential Electricity Consumption., , , and . IEEE Internet Things J., 10 (17): 15666-15678 (September 2023)The estimates of trigonometric sums and new bounds on a mean value, a sequence and a cryptographic function., , , , and . Des. Codes Cryptogr., 91 (3): 921-949 (March 2023)Fast algorithm for HEVC intra-coding implemented by preprocessing., , , , and . IET Image Processing, 13 (9): 1578-1586 (2019)Thin-Film-Shaped Flexible Actuators., , , , and . Adv. Intell. Syst., (August 2023)Composite braking AMT shift strategy for extended-range heavy commercial electric vehicle based on LHMM/ANFIS braking intention identification., , , , and . Clust. Comput., 22 (Supplement): 8513-8528 (2019)A Symbolic Model for Systematically Analyzing TEE-Based Protocols., , , , , and . ICICS, volume 12282 of Lecture Notes in Computer Science, page 126-144. Springer, (2020)