Author of the publication

BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme.

, , , , and . J. Inf. Secur. Appl., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Series Incremental Inductance Detection Based Sensorless Startup Method for DSEM., , , , and . IEEE Trans. Ind. Electron., 68 (10): 9297-9308 (2021)A Doubly-Grounded Transformer-Less Single-Phase PV Inverter With Boost Capability., , , , , , , and . ICIT, page 1637-1642. IEEE, (2019)New approach to suppress torque ripple and improve torque output for wound-excited doubly salient machine., , , , and . IECON, page 2857-2861. IEEE, (2016)Algorithm for balancing both continuous and categorical covariates in randomized controlled trials., , and . Comput. Methods Programs Biomed., 108 (3): 1185-1190 (2012)Exergy transfer effectiveness on heat exchanger for finite pressure drop, , , and . Energy, 32 (11): 2110 - 2120 (2007)Listen carefully to experts when you classify data: A generic data classification ontology encoded from regulations., , , , and . Inf. Process. Manag., 60 (2): 103186 (2023)Open-Circuit Fault Diagnosis for MMC Based on Event-Triggered and Capacitor Current State Observation., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 69 (2): 534-538 (2022)Dots., , and . Interactions, 27 (6): 10-13 (2020)Tsinghua University at TRECVID 2005., , , , , , , , , and 5 other author(s). TRECVID, National Institute of Standards and Technology (NIST), (2005)Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3., , , and . IEEE Trans. Dependable Secur. Comput., 16 (2): 272-286 (2019)