Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An e-commerce trust model based on expanded subjective logic., , , and . IJHPCN, 9 (5/6): 372-381 (2016)A novel image encryption algorithm using PWLCM map-based CML chaotic system and dynamic DNA encryption., , , , , , , and . Multim. Tools Appl., 80 (21): 32841-32861 (2021)Fine-grained assured insertion and deletion scheme based on onion encryption in cloud storage., and . Concurr. Comput. Pract. Exp., (2023)SLChain: A secure and low-storage pressure sharding blockchain., , and . Concurr. Comput. Pract. Exp., (2024)PGCE: A distributed storage causal consistency model based on partial geo-replication and cloud-edge collaboration architecture., , and . Comput. Networks, (2022)TSBFT: A scalable and efficient leaderless byzantine consensus for consortium blockchain., , and . Comput. Networks, (February 2023)A causal consistency model based on grouping strategy., and . J. Supercomput., 78 (16): 17736-17757 (2022)Multi-modal multi-hop interaction network for dialogue response generation., , , , , , and . Expert Syst. Appl., (October 2023)A Trust Model Based on the Multinomial Subjective Logic for P2P Network., , , and . Int. J. Commun. Netw. Syst. Sci., 2 (6): 546-554 (2009)A New Active DDoS Defense System Based on Automatic Learning., , and . ASIAN, volume 3818 of Lecture Notes in Computer Science, page 249-250. Springer, (2005)