Author of the publication

Practical Single Sign-on Mechanism for Distributed Computer Networks.

, , , and . Ad Hoc Sens. Wirel. Networks, 31 (1-4): 131-149 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Data Possession Auditing for Real-World Cloud Storage Environments., , , , and . IEICE Trans. Inf. Syst., 98-D (4): 796-806 (2015)Practical Single Sign-on Mechanism for Distributed Computer Networks., , , and . Ad Hoc Sens. Wirel. Networks, 31 (1-4): 131-149 (2016)A Two-Stage GCN-Based Deep Reinforcement Learning Framework for SFC Embedding in Multi-Datacenter Networks., , , , , and . IEEE Trans. Netw. Serv. Manag., 20 (4): 4297-4312 (December 2023)Determination of Planetary Boundary Layer height with Lidar Signals Using Maximum Limited Height Initialization and Range Restriction (MLHI-RR)., , , , , and . Remote. Sens., 12 (14): 2272 (2020)Development of ZJU High-Spectral-Resolution Lidar for Aerosol and Cloud: Extinction Retrieval., , , , , and . Remote. Sens., 12 (18): 3047 (2020)Lidar Ratio Regional Transfer Method for Extinction Coefficient Accuracy Improvement in Lidar Networks., , , , , , , and . Remote. Sens., 14 (3): 626 (2022)Applying Binary Patch Comparison to Cisco IOS., , , and . ICNCC, page 38-42. ACM, (2017)AI-Enabled Automated and Closed-Loop Optimization Algorithms for Delay-Aware Network., , , , , and . WCNC, page 806-811. IEEE, (2022)An end-to-end model for Android malware detection., , and . ISI, page 140-142. IEEE, (2017)TH-VSS: An Asymmetric Storage Virtualization System for the SAN Environment., , , and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 399-406. Springer, (2005)