Author of the publication

A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G.

, , , and . DSC, page 567-572. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Trustworthiness Evaluation Method for Software Architectures Based on the Principle of Maximum Entropy (POME) and the Grey Decision-Making Method (GDMM).. Entropy, 16 (9): 4818-4838 (2014)Influence of interlayer on the performance of phosphorescent white organic light-emitting devices., , , and . Displays, 33 (3): 142-145 (2012)An electronic medical record access control model based on intuitionistic fuzzy trust., , , , and . Inf. Sci., (February 2024)A Privacy Security Risk Analysis Method for Medical Big Data in Urban Computing., , and . IEEE Access, (2019)Competitive Cloud Pricing for Long-Term Revenue Maximization., , and . J. Comput. Sci. Technol., 34 (3): 645-656 (2019)Two step composite quantile regression for single-index models., , , and . Comput. Stat. Data Anal., (2013)Composite quasi-likelihood for single-index models with massive datasets., , and . Commun. Stat. Simul. Comput., 51 (9): 5024-5040 (2022)Renewable quantile regression for streaming data sets., and . Neurocomputing, (2022)Dependent Function Embedding for Distributed Serverless Edge Computing., , , , , , , , and . IEEE Trans. Parallel Distributed Syst., 33 (10): 2346-2357 (2022)EPEEC: comprehensive SPICE-compatible reluctance extraction for high-speed interconnects above lossy multilayer substrates., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 24 (10): 1562-1571 (2005)