Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trustworthy Software Development Based on Model Driven Architecture., , and . ICICA (1), volume 391 of Communications in Computer and Information Science, page 193-202. Springer, (2013)An ID-Based Linear Homomorphic Cryptosystem and Its Applications for the Isolated Smart Grid Devices., , and . SciSec, volume 11933 of Lecture Notes in Computer Science, page 339-353. Springer, (2019)ABE with improved auxiliary input for big data security., , , and . J. Comput. Syst. Sci., (2017)Trajectory Privacy Preserving for LBS in P2P Environment., , , and . ICBDC, page 134-138. ACM, (2018)What Makes an Online Review More Helpful: An Interpretation Framework Using XGBoost and SHAP Values., , , and . J. Theor. Appl. Electron. Commer. Res., 16 (3): 466-490 (2021)Modeling Activity Diagrams with Extended Petri Nets., , , and . Intell. Autom. Soft Comput., 17 (6): 725-735 (2011)Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain and Edge Computing., , , and . SciSec, volume 11933 of Lecture Notes in Computer Science, page 181-189. Springer, (2019)