Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Seamless service migration for human-centered computing in future Internet architecture., , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1-7. IEEE, (2017)Information-theoretic modeling of false data filtering schemes in wireless sensor networks., , , and . ACM Trans. Sens. Networks, 8 (2): 14:1-14:19 (2012)Trustworthy Collaborative Filtering through Downweighting Noise and Redundancy., , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 129-140. Springer, (2015)PShard: A Practical Sharding Protocol for Enterprise Blockchain., , , , , , and . ICBTA, page 110-116. ACM, (2022)Fuzzy Keyword Search over Encrypted Data in the Public Key Setting., , , and . WAIM, volume 7923 of Lecture Notes in Computer Science, page 729-740. Springer, (2013)API Sequences Based Malware Detection for Android., , , and . UIC/ATC/ScalCom, page 673-676. IEEE Computer Society, (2015)Efficient Identity-Based Key Issue with TPM., , , and . ICYCS, page 2354-2359. IEEE Computer Society, (2008)Produre: A Novel Proximity Discovery Mechanism in Location Tagging System., , , , , and . CISIS, volume 6694 of Lecture Notes in Computer Science, page 238-245. Springer, (2011)Kaya: A Testing Framework for Blockchain-based Decentralized Applications., , , , , , and . ICSME, page 826-829. IEEE, (2020)An efficient certificateless aggregate signature with constant pairing computations., , , and . Inf. Sci., (2013)