Author of the publication

Controlling cloud data access privilege: Cryptanalysis and security enhancement.

, , , and . PIMRC, page 1-5. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quality of Service Verification Experiments., , , and . MMNET, page 163-172. (1995)Toward A new Approach for Web Services Development Life Cycle., , , , and . ISWS, page 94-103. CSREA Press, (2005)A Multi-Objective Optimization Model For Planning Robust and Least Interfered Wireless Mesh Networks., , and . GLOBECOM, page 5307-5312. IEEE, (2008)On the Design of Bi-Connected Wireless Mesh Network Infrastructure with QoS Constraints., , and . GLOBECOM, page 1-8. IEEE, (2009)Distributed Admission Control in Wireless Mesh Networks: Models, Algorithms, and Evaluation., , and . IEEE Trans. Vehicular Technology, 59 (3): 1459-1473 (2010)Parallel Multiprocessor Approaches to the RNA Folding Problem., , , and . PPAM, volume 4967 of Lecture Notes in Computer Science, page 1230-1239. Springer, (2007)An Isometric on on-Chip Multiprocessor Architecture., , and . ICECS, page 991-994. IEEE, (2007)Mobility-Aware Streaming Rate Recommendation System., , and . GLOBECOM, page 1-5. IEEE, (2011)Dynamic spatial partition density-based emergency message dissemination in VANETs., , and . Veh. Commun., 2 (4): 208-222 (2015)A Hybrid Mesh-Explicit Multicast Protocol for MANETs., , and . MWCN, page 131-135. IEEE, (2007)