Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forecasting manufacturing industrial natural gas consumption of China using a novel time-delayed fractional grey model with multiple fractional order., , , , and . Comput. Appl. Math., (2020)User Access Privacy in OAuth 2.0 and OpenID Connect., and . EuroS&P Workshops, page 664-672. IEEE, (2020)Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data., , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 288-302. Springer, (2018)From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions., and . ISC, volume 14411 of Lecture Notes in Computer Science, page 183-202. Springer, (2023)Evolutionary Algorithms in Web Security: Exploring Untapped Potential., , and . CSNDSP, page 1-6. IEEE, (2020)Analysing the Security of Google's implementation of OpenID Connect., and . CoRR, (2015)LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator., , , , and . J. Ambient Intell. Humaniz. Comput., 14 (7): 8613-8629 (July 2023)An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter., , , and . Int. J. Netw. Secur., 18 (5): 960-968 (2016)ICAS: Two-factor identity-concealed authentication scheme for remote-servers., , , , , and . J. Syst. Archit., (2021)Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect., , and . CoRR, (2018)