Author of the publication

RootAgency: A digital signature-based root privilege management agency for cloud terminal devices.

, , , , , and . Inf. Sci., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Partition Approach to Lower Bounds for Zero-Visibility Cops and Robber., , , and . IWOCA, volume 11638 of Lecture Notes in Computer Science, page 442-454. Springer, (2019)Atmospheric and Forest Decoupling of Passive Microwave Brightness Temperature Observations Over Snow-Covered Terrain in North America., and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 10 (7): 3172-3189 (2017)The impact of topology in robust routing on wireless mesh networks., and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 14 (4): 46-48 (2010)Illumination Normalization Based on Homomorphic Wavelet Filtering for Face Recognition., , and . J. Inf. Sci. Eng., 29 (3): 579-594 (2013)Optimal Resource Allocation in Wireless Ad Hoc Networks: A Price-Based Approach., , and . IEEE Trans. Mob. Comput., 5 (4): 347-364 (2006)Flight Risk Probabilities During Wake Encountering Using Multivariate Copula Model., , , and . FSDM, volume 281 of Frontiers in Artificial Intelligence and Applications, page 200-205. IOS Press, (2015)The robust joint solution for channel assignment and routing for wireless mesh networks with time partitioning., and . Ad Hoc Networks, (2014)Mining Competitive Intelligence from Social Media: A Case Study of IBM., , and . PACIS, page 313. (2018)Ensemble sufficient dimension folding methods for analyzing matrix-valued data., , and . Comput. Stat. Data Anal., (2016)A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment., , , and . IEEE Access, (2019)