Author of the publication

Dependable Architecture of RFID Middleware on Networked RFID Systems.

, , , , and . GreenCom/iThings/CPScom, page 1881-1884. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dependable Architecture of RFID Middleware on Networked RFID Systems., , , , and . GreenCom/iThings/CPScom, page 1881-1884. IEEE, (2013)SFTopk: Secure Functional Top-k Query via Untrusted Data Storage., , , and . IEEE Access, (2015)(k, ε , δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy., , , , , , , and . Serv. Oriented Comput. Appl., 15 (3): 175-185 (2021)Design of event-based Intrusion Detection System on OpenFlow Network., , , , and . DSN, page 1-2. IEEE Computer Society, (2013)PCTopk: Privacy-and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-Tiered Sensor Networks., , , and . SRDS, page 191-200. IEEE Computer Society, (2014)A Programming Framework for Implementing Fault-Tolerant Mechanism in IoT Applications., , , , , , , and . ICA3PP (3), volume 9530 of Lecture Notes in Computer Science, page 771-784. Springer, (2015)Mining Large Network Reconnaissance Data., , , and . PRDC, page 183-187. IEEE Computer Society, (2013)Toward Fog-Based Event-Driven Services for Internet of Vehicles: Design and Evaluation., , , , , , , and . IOV, volume 10689 of Lecture Notes in Computer Science, page 201-212. Springer, (2017)