Author of the publication

A novel access control protocol using proxy signatures for cloud-based health information exchange.

, , and . Comput. Secur., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ABRP: Anchor-based Routing Protocol for Mobile Ad Hoc Networks., and . Wireless Personal Communications, 42 (2): 277-300 (2007)An Improved O(log N) Mutual Exclusion Algorithm for Distributed Systems., , and . ICPP (3), page 295-302. Pennsylvania State University Press, (1990)0-271-00728-1.Analysis of the Probability of Transaction Abort and Throughput of Two Timestamp Ordering Algorithms for Database Systems.. IEEE Trans. Knowl. Data Eng., 3 (2): 261-266 (1991)Carpooling in Mobile Ad Hoc Networks: the Case of Multiple-Target Route Discovery., and . WiOpt, page 1-9. IEEE, (2007)Update Transport: A New Technique for Update Synchronization in Replicated Database Systems.. IEEE Trans. Software Eng., 16 (12): 1325-1336 (1990)Invariant-Based Verification of a Distributed Deadlock Detection Algorithm., and . IEEE Trans. Software Eng., 17 (8): 789-799 (1991)Measures of the Potential for Load Sharing in Distributed Computing Systems., and . IEEE Trans. Software Eng., 21 (5): 468-475 (1995)Towards Energy-Fairness in LoRa Networks., , , , and . ICDCS, page 788-798. IEEE, (2019)Communication Patterns in Distributed Computations., and . J. Parallel Distributed Comput., 62 (6): 1104-1119 (2002)Asynchronous recovery without using vector timestamps., and . J. Parallel Distributed Comput., 62 (12): 1695-1728 (2002)