Author of the publication

Efficient threshold password-authenticated secret sharing protocols for cloud computing.

, , , , , , , , and . J. Parallel Distributed Comput., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diversity Backpressure Scheduling and Routing with Mutual Information Accumulation in Wireless Ad-hoc Networks, and . CoRR, (2013)Recognition of a Phase-Sensitivity OTDR Sensing System Based on Morphologic Feature Extraction., , , and . Sensors, 15 (7): 15179-15197 (2015)Two-Dimensional Stationary Dyadic Wavelet Transform, Decimated Dyadic Discrete Wavelet Transform and the Face Recognition Application., , and . Int. J. Wavelets Multiresolution Inf. Process., 9 (3): 397-416 (2011)Performance Analysis of Push-Based Converged Networks With Limited Storage., , and . IEEE Trans. Wirel. Commun., 15 (12): 8154-8168 (2016)Impact of spatial diversity on spectral efficiency of cooperative relaying., , , and . CISS, page 1-6. IEEE, (2015)Editorial of special issue on security and privacy in cloud computing., , and . J. Inf. Secur. Appl., (2016)Lightweight ship detection method based on Swin-YOLOFormer., , , , , , and . J. Electronic Imaging, (2024)Pretrained Deep Learning Networks and Multispectral Imagery Enhance Maize LCC, FVC, and Maturity Estimation., , , , , , , , , and 2 other author(s). Remote. Sens., 16 (5): 784 (March 2024)EQuaTE: Efficient Quantum Train Engine for Runtime Dynamic Analysis and Visual Feedback in Autonomous Driving., , , , , and . IEEE Internet Comput., 27 (5): 24-31 (September 2023)Modeling the failures of power-aware data centers by leveraging heat recirculation., , and . Concurr. Comput. Pract. Exp., 33 (7): 1 (2021)