Author of the publication

Game-theory-based batch identification of invalid signatures in wireless mobile networks.

, , , and . INFOCOM, page 262-270. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification., , , and . KSII Trans. Internet Inf. Syst., 16 (8): 2507-2528 (2022)PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices., , , , , and . Future Gener. Comput. Syst., (2022)Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs., , , , , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 590-598. Springer, (2013)HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors., , , , and . ICICS (1), volume 12918 of Lecture Notes in Computer Science, page 136-152. Springer, (2021)A Survey of Security Network Coding toward Various Attacks., , , , and . TrustCom, page 252-259. IEEE Computer Society, (2014)Charge-Depleting of the Batteries Makes Smartphones Recognizable., , , and . ICPADS, page 33-40. IEEE Computer Society, (2017)In-Network Historical Data Storage and Query Processing Based on Distributed Indexing Techniques in Wireless Sensor Networks., , , and . WASA, volume 5682 of Lecture Notes in Computer Science, page 264-273. Springer, (2009)EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data., , , , , , and . IEEE Trans. Serv. Comput., 13 (6): 1072-1085 (2020)Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 4002-4018 (2022)