Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy games with communication networks., , , and . GAMENETS, page 1-4. IEEE, (2014)An Alternating Direction Method of Multipliers Based Approach for PMU Data Recovery., , , , , and . IEEE Trans. Smart Grid, 10 (4): 4554-4565 (2019)A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity.. Future Gener. Comput. Syst., (2018)Extended Prony Analysis on Power System Oscillation Under a Near-Resonance Condition., , , , and . CoRR, (2020)Leakage resilient CCA secure IBE with all-but-one lossy filter.. Int. J. Ad Hoc Ubiquitous Comput., 21 (4): 266-272 (2016)A Resilient Power System Operation Strategy Considering Transmission Line Attacks., , , , , and . IEEE Access, (2018)Fast multicast scheme with secure network coding in cloud data centers., , , , , and . Comput. Sci. Inf. Syst., 13 (2): 531-545 (2016)Accurate Power Sharing and Synthetic Inertia Control for DC Building Microgrids With Guaranteed Performance., , , , , and . IEEE Access, (2019)CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency., and . ISC, volume 9290 of Lecture Notes in Computer Science, page 319-335. Springer, (2015)An Identity-Based Data Aggregation Protocol for the Smart Grid.. IEEE Trans. Ind. Informatics, 13 (5): 2428-2435 (2017)