Author of the publication

Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data.

, , , and . J. Inf. Sci. Eng., 30 (3): 787-817 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks., , , and . IEEE Communications Letters, 12 (2): 127-129 (2008)A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol., , and . Inf. Sci., 181 (1): 234-238 (2011)EFoX: A Scalable Method for Extracting Frequent Subtrees., , and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 813-817. Springer, (2005)An Improved Protocol for Server-Aided Authenticated Group Key Establishment., , , , and . ICCSA (5), volume 6786 of Lecture Notes in Computer Science, page 437-446. Springer, (2011)EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data., , , and . IDEAL, volume 3578 of Lecture Notes in Computer Science, page 1-8. Springer, (2005)Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (2): 865-868 (2011)Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group., , , , and . HCI (11), volume 6771 of Lecture Notes in Computer Science, page 339-348. Springer, (2011)Extraction of Interesting Financial Information from Heterogeneous XML-Based Data., , and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 356-363. Springer, (2006)Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords., , , , and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 173-181. Springer, (2009)Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment., , , and . KSII Trans. Internet Inf. Syst., 6 (2): 751-765 (2012)