Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anti-conspiracy attack threshold signature model and protocol., , , and . Int. J. Wirel. Mob. Comput., 17 (3): 300-306 (2019)Trusted connection architecture of Internet of Things oriented to perception layer., , , , , and . Int. J. Wirel. Mob. Comput., 12 (3): 224-231 (2017)Research on CLPKC-IDPKC cross-domain identity authentication for IoT environment., , and . Comput. Commun., (2020)An Efficient Malicious Code Detection System Based on Convolutional Neural Networks., , , , , and . CSAI/ICIMT, page 86-89. ACM, (2018)A Many-Objective Multistage Optimization-Based Fuzzy Decision-Making Model for Coal Production Prediction., , , , and . IEEE Trans. Fuzzy Syst., 29 (12): 3665-3675 (2021)Trusted data collection for Internet of Things., , , and . Concurr. Comput. Pract. Exp., (2021)A decentralized and reliable trust measurement for edge computing enabled Internet of Things., , and . Concurr. Comput. Pract. Exp., (2022)Hierarchy Merkle tree wireless sensor network architecture., , , , , and . Int. J. Wirel. Mob. Comput., 12 (4): 341-348 (2017)Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios., , , and . ICCNS, page 64-68. ACM, (2022)Identity-based Linkable Blind Ring Signature Scheme on Lattice., , , , , , , and . ICCNS, page 51-57. ACM, (2022)