Author of the publication

Trust-based service composition and selection in service oriented architecture.

, , , , , and . Peer-to-Peer Netw. Appl., 11 (5): 862-880 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Identity-based Signcryption with Provably-secure., , and . J. Digit. Content Technol. its Appl., 4 (7): 148-153 (2010)Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET., , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (11): 13108-13122 (November 2023)APPLET: a privacy-preserving framework for location-aware recommender system., , , , , , and . Sci. China Inf. Sci., 60 (9): 92101 (2017)Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing., , , , and . Sci. China Inf. Sci., 60 (5): 52103:1-52103:17 (2017)CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases., , , , , , and . IEEE J. Sel. Areas Commun., 40 (11): 3191-3206 (2022)An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment., , , and . IEICE Trans. Inf. Syst., 93-D (3): 430-437 (2010)Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems., , , , , , and . IEEE Syst. J., 16 (2): 3096-3107 (2022)Practical Secret Sharing Scheme Realizing Generalized Adversary Structure., and . J. Comput. Sci. Technol., 19 (4): 564-569 (2004)DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing., , , , and . Future Gener. Comput. Syst., (2018)SADUS: Secure data deletion in user space for mobile devices., , , and . Comput. Secur., (2018)