Author of the publication

Information flow based defensive chain for data leakage detection and prevention: a survey.

, , , , , , and . CoRR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks., , , , and . IJDSN, (2012)Measurement on the border effect of transboundary water resources: A case study of China's Zhanghe basin., , , and . SMC, page 1928-1934. IEEE, (2014)Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks., , , , , and . ICC, page 1-6. IEEE, (2019)Efficient and Identity-based Signcryption with Provably-secure., , and . J. Digit. Content Technol. its Appl., 4 (7): 148-153 (2010)An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (3): 826-829 (2006)An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment., , , and . IEICE Trans. Inf. Syst., 93-D (3): 430-437 (2010)Smart Applications in Edge Computing: Overview on Authentication and Data Security., , , , and . IEEE Internet Things J., 8 (6): 4063-4080 (2021)Fast and Secure Location-Based Services in Smart Cities on Outsourced Data., , , , , and . IEEE Internet Things J., 8 (24): 17639-17654 (2021)ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV., , , and . IEEE Internet Things J., 9 (22): 22903-22913 (2022)Practical Secret Sharing Scheme Realizing Generalized Adversary Structure., and . J. Comput. Sci. Technol., 19 (4): 564-569 (2004)