Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Dictionary Learning Method for Gas Identification With a Gas Sensor Array., , , , , and . IEEE Trans. Ind. Electron., 64 (12): 9709-9715 (2017)DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5., , , , , and . Comput. Secur., (2019)A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network., , , , and . MSN, page 818-824. IEEE, (2021)High Radix Montgomery Modular Multiplier on Modern FPGA., , , and . TrustCom/ISPA/IUCC, page 1484-1489. IEEE Computer Society, (2013)How to Block the Malicious Access to Android External Storage., , , , , and . ICISC, volume 11396 of Lecture Notes in Computer Science, page 287-303. Springer, (2018)PIV4DB: Probabilistic Integrity Verification for Cloud Database., , , , and . ISCC, page 1-7. IEEE, (2020)Employing Smartwatch for Enhanced Password Authentication., , , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 691-703. Springer, (2017)Vulnerable Service Invocation and Countermeasures., , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (4): 1733-1750 (2021)MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker., , , , , and . SERE, page 119-128. IEEE, (2013)Mediated Hierarchical Identity-Based Combined Public Key Schemes., , , and . IITSI, page 614-618. IEEE Computer Society, (2010)