Author of the publication

Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection.

, , , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Middleware Support to the Specification and Execution of Active Rules for Biological Database Constraint Management., , and . IRI, page 406-411. IEEE Systems, Man, and Cybernetics Society, (2007)Composite event processing in an active rule-based fuzzy XML database system., and . IRI, page 7-10. IEEE Systems, Man, and Cybernetics Society, (2011)The IRules Project - Using Active Rules for the Integration of Distributed Software Components., , , , , and . DS-9, volume 239 of IFIP Conference Proceedings, page 255-275. Kluwer, (2001)Extending the OBJECTIVE Benchmark for Evaluation of Active Rules in a Distributed Component Integration Environment., , and . J. Database Manag., 17 (4): 47-69 (2006)Application of flexible friction nano-generator in human motion information acquisition., , and . J. Comput. Methods Sci. Eng., 22 (1): 147-159 (2022)Visualizing the United States electricity-water-climate nexus., and . Environ. Model. Softw., (2021)An Integration Rule Processing Algorithm and Execution Environment for Distributed Component Integration., , , and . Informatica (Slovenia), 30 (2): 193-212 (2006)Events in an Active Rule-Based Fuzzy XML Database System., and . SEDE, page 13-23. ISCA, (2011)Formalizing Active Networks Security with Seal-Calculus., , and . ISPA, volume 2745 of Lecture Notes in Computer Science, page 391-404. Springer, (2003)Upper bounds on the Natarajan dimensions of some function classes.. ISIT, page 1020-1025. IEEE, (2023)