Author of the publication

The Implementation of Security Algorithm of Mobile Agent on Roblet.

, , and . ISEC, volume 2040 of Lecture Notes in Computer Science, page 70-78. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Online Optimization for Charging and Discharging of Plug-in Electric Vehicles., , , , , , , and . CBS, page 407-412. IEEE, (2023)From Software to Hardware - A Novel TLM Auto-Generating Method., and . APCCAS, page 1725-1728. IEEE, (2006)A Cloud Provider's View of EDNS Client-Subnet Adoption., , and . TMA, page 129-136. IEEE, (2019)Real-time Entity Resolution by Multiple Indices., , , and . ICCSE, page 1063-1068. IEEE, (2019)The Implementation of Security Algorithm of Mobile Agent on Roblet., , and . ISEC, volume 2040 of Lecture Notes in Computer Science, page 70-78. Springer, (2001)AGOM: A Novel Method of Embedded System Communication Architecture Design in System Level Design., , , , and . CSCWD, page 324-329. IEEE, (2006)Processing Recommender Top-N Queries in Relational Databases., , , and . J. Softw., 10 (2): 162-171 (2015)MOTS: Multiple Object Tracking for General Categories Based On Few-Shot Method., , , , , , , and . CoRR, (2020)Specification for DNS over Transport Layer Security (TLS)., , , , , and . RFC, (May 2016)Is acupuncture beneficial in depression: a meta-analysis of 8 randomized controlled trials?, , , , , , and . J Affect Disord, 111 (2-3): 125--134 (December 2008)