Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Research and Outlook for Keyword-Based Searchable Encryption in Cloud Storage., , , , , and . J. Commun., 10 (10): 766-772 (2015)Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme., , , , and . J. Networks, 6 (11): 1557-1564 (2011)An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering., , , and . J. Networks, 8 (3): 672-679 (2013)The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment., , , , , and . KSII Trans. Internet Inf. Syst., 6 (1): 131-146 (2012)Trend Analysis and Countermeasure Research of DDoS Attack Under 5G Network., , and . CSP, page 153-160. IEEE, (2021)A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment., , and . Symmetry, 12 (1): 150 (2020)A Survey on Green Computing Based on Cloud Environment., , , , and . Int. J. Online Eng., 9 (3): 27-33 (2013)The efficiency improved scheme for secure access control of digital video distribution., , , , and . Multim. Tools Appl., 75 (20): 12645-12662 (2016)An Improved Dynamic Password based Group Key Agreement against Dictionary Attack., , , , and . J. Softw., 7 (7): 1524-1530 (2012)Analysis and Enhancement of Three Identity-based Signcryption Protocols., , , , and . J. Comput., 7 (4): 1006-1013 (2012)