Author of the publication

Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT.

, , , , and . IEEE Syst. J., 17 (1): 38-49 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheduling performance polymorphic computations in real-time systems., and . COMPSAC, page 406-411. IEEE, (1991)A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks., , , , and . Sensors, 17 (11): 2681 (2017)Multi-angle Evaluations of Test Cases Based on Dynamic Analysis., and . ADMA, volume 8933 of Lecture Notes in Computer Science, page 406-420. Springer, (2014)A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures., , , , and . IEEE Access, (2019)Sensor bias jump detection and estimation with range only measurements., , and . ICIA, page 1658-1663. IEEE, (2015)Distributed-Log-based Scheme for IP Traceback., , , and . CIT, page 711-715. IEEE Computer Society, (2005)A Class of Optimal Frequency Hopping Sequences Based upon the Theory of Power Residues., , , and . SETA, volume 5203 of Lecture Notes in Computer Science, page 188-196. Springer, (2008)NeRF2Points: Large-Scale Point Cloud Generation From Street Views' Radiance Field Optimization., , , , , , , , , and . CoRR, (2024)Gated SSA-based Demand-Driven Symbolic Analysis for Parallelizing Compilers., and . International Conference on Supercomputing, page 414-423. ACM, (1995)GuidedMix-Net: Learning to Improve Pseudo Masks Using Labeled Images as Reference., , , , and . CoRR, (2021)