Author of the publication

The provision of patron services in Chinese academic libraries responding to the COVID-19 pandemic.

, , , , , and . Libr. Hi Tech, 39 (2): 533-548 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Probability-Based Anti-Collision Protocol for RFID Tag Identification., and . Wireless Personal Communications, 107 (1): 57-79 (2019)BSRA: Blockchain-Based Secure Remote Authentication Scheme for Fog-Enabled Internet of Things., , , and . IEEE Internet Things J., 11 (2): 3348-3361 (January 2024)Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing., , and . IEEE Trans. Mob. Comput., 21 (8): 2718-2731 (2022)Retinal Vessel Segmentation Method Based on Improved Deep U-Net., , , and . CCBR, volume 11818 of Lecture Notes in Computer Science, page 321-328. Springer, (2019)A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System., , and . ISECS, page 254-257. IEEE Computer Society, (2008)Multiperiod multiattribute decision-making method based on trend incentive coefficient., and . ITOR, 20 (1): 141-152 (2013)CS-LAKA: A Lightweight Authenticated Key Agreement Protocol With Critical Security Properties for IoT Environments., and . IEEE Trans. Serv. Comput., 16 (6): 4102-4114 (November 2023)SecFHome: Secure remote authentication in fog-enabled smart home environment., , and . Comput. Networks, (2022)A Reputation System with Anti-Pollution Mechanism in P2P File Sharing Systems., , and . Int. J. Distributed Sens. Networks, 5 (1): 44 (2009)Superword: A honeyword system for achieving higher security goals., , and . Comput. Secur., (2021)