Author of the publication

A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature.

, , , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection., , , , , , , and . IEEE Access, (2019)A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature., , , , , , and . IEEE Access, (2019)Cross-domain vulnerability detection using graph embedding and domain adaptation., , , , and . Comput. Secur., (2023)Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud., , , , , and . Secur. Commun. Networks, (2022)Security Protocol for RFID System Conforming to EPC-C1G2 Standard., , , , and . J. Comput., 8 (3): 605-612 (2013)Based on the character of cloud storage string encryption and cipher text retrieval of string research., , , and . CCIS, page 409-413. IEEE, (2016)Machine Learning and Deep Learning Methods for Cybersecurity., , , , , , , , and . IEEE Access, (2018)Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing., , , , and . Secur. Commun. Networks, (2018)A New Target Classification Method for Synthetic Aperture Radar Images based on Wavelet Scattering Transform., , , , , and . ICSPCC, page 1-6. IEEE, (2020)Some results on preserving K-member simply separable relations in partial K-valued logic., , and . ICDIP, volume 8009 of SPIE Proceedings, page 80091I. SPIE, (2011)