Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A simple construction of encryption for a tiny domain message., , and . CISS, page 1-6. IEEE, (2017)Improved Sparse Coding Algorithm with Device-Free Localization Technique for Intrusion Detection and Monitoring., , , , and . Symmetry, 11 (5): 637 (2019)CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin., and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 324-337. Springer, (2020)A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree., and . ADMA, volume 5139 of Lecture Notes in Computer Science, page 170-181. Springer, (2008)Security and experimental performance analysis of a matrix ORAM., , , and . ICC, page 1-6. IEEE, (2016)A MQTT-API-compatible IoT security-enhanced platform., , , , , , , , and . Int. J. Sens. Networks, 32 (1): 54-68 (2020)Special issue on security and privacy of blockchain technologies., , , , and . Int. J. Inf. Sec., 19 (3): 243-244 (2020)Age Efficient Optimization in UAV-Aided VEC Network: A Game Theory Viewpoint., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (12): 25287-25296 (2022)Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device., , , , and . ACM Trans. Embed. Comput. Syst., 18 (3): 23:1-23:13 (2019)Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems., , , and . IEEE Access, (2018)