Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deciding Recognizability under Dolev-Yao Intruder Model., and . ISC, volume 6531 of Lecture Notes in Computer Science, page 416-429. Springer, (2010)Stateless key distribution for secure intra and inter-group multicast in mobile wireless network., and . Comput. Networks, 51 (15): 4303-4321 (2007)Sybil Attack Detection through Global Topology Pattern Visualization., , , and . Inf. Vis., 10 (1): 32-46 (2011)Lightweight Examination of DLL Environments in Virtual Machines to Detect Malware., and . SCC@AsiaCCS, page 10-16. ACM, (2016)Secure and efficient access to outsourced data., , , and . CCSW, page 55-66. ACM, (2009)Enhancing participant selection through caching in mobile crowd sensing., , , , and . IWQoS, page 1-10. IEEE, (2016)Investigation on Different Stator Structures of the Axial-Radial Flux Switched Reluctance Motors., , , , , , , and . IEEE Trans. Ind. Electron., 71 (6): 5474-5484 (June 2024)Secure Group-Based Information Sharing in Mobile Ad Hoc Networks., and . ICC, page 1695-1699. IEEE, (2008)Node localization through physical layer network coding: Bootstrap, security, and accuracy., and . Ad Hoc Networks, 10 (7): 1267-1277 (2012)An investigation of collaborations between top Chinese universities: a new quantitative approach., , and . Scientometrics, 98 (2): 1535-1545 (2014)