Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Protection Method Based on Access Control., , , , and . APSIPA, page 254-259. IEEE, (2018)Provably secure one-round identity-based authenticated asymmetric group key agreement protocol., , , and . Inf. Sci., 181 (19): 4318-4329 (2011)Asymmetric group key agreement protocol for open networks and its application to broadcast encryption., , , , and . Comput. Networks, 55 (15): 3246-3255 (2011)Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments., , , , , and . Wirel. Pers. Commun., 116 (3): 1765-1783 (2021)A Scalable Cross-Chain Access Control and Identity Authentication Scheme., , , , , and . Sensors, 23 (4): 2000 (February 2023)A Traffic Video Background Extraction Algorithm Based on Image Content Sensitivity., , , , and . ICSI (2), volume 6146 of Lecture Notes in Computer Science, page 603-610. Springer, (2010)Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks., , , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 448-461. Springer, (2014)An efficient framework for online virtual network embedding in virtualized cloud data centers., , and . CloudNet, page 159-164. IEEE, (2015)MixGeo: efficient secure range queries on encrypted dense spatial data in the cloud., , , , , and . IWQoS, page 29:1-29:10. ACM, (2019)Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc Networks., , , , , and . AINA Workshops, page 22-24. IEEE Computer Society, (2015)