Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets., and . IEEE Trans. Dependable Secur. Comput., 8 (6): 852-865 (2011)Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing., , , , and . IoTBD, page 243-254. SciTePress, (2016)Verifiable Encrypted Search with Forward Secure Updates for Blockchain-Based System., , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 206-217. Springer, (2020)Virtual backbone construction for large-scale ad hoc UAV networks., , , and . Int. J. Sens. Networks, 31 (4): 216-225 (2019)Delay-bounded and minimal energy broadcast in satellite networks with multi-power levels., , , , and . ICC, page 1-6. IEEE, (2017)Path Planning for Sensor Data Collection by Using UAVs., , and . MSN, page 199-205. IEEE, (2018)A technique for generating the reduced reachability graph of petri net models., , , and . SMC, page 3636-3641. IEEE, (2008)Multi-resource allocation in cloud radio access networks., , , , and . ICC, page 1-6. IEEE, (2017)Solving Dynamic Vehicle Routing Problem with Soft Time Window by iLNS and hPSO., , , , and . COCOA, volume 10043 of Lecture Notes in Computer Science, page 702-709. Springer, (2016)Handling least privilege problem and role mining in RBAC., , , and . J. Comb. Optim., 30 (1): 63-86 (2015)