Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Mobile Agents in Electronic Commerce by Using Undetachable Signatures from Pairings., , , and . ICEB, page 1038-1043. Academic Publishers/World Publishing Corporation, (2004)Robustness Analysis of Asynchronous Sampled-Data Multiagent Networks With Time-Varying Delays., , and . IEEE Trans. Automat. Contr., 63 (7): 2145-2152 (2018)An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices., , , and . ACSAC, page 16-29. ACM, (2016)Analysis of Consensus-Based Economic Dispatch Algorithm Under Time Delays., , and . IEEE Trans. Syst. Man Cybern. Syst., 50 (8): 2978-2988 (2020)Deep Multi-Region Hashing., , , , and . ICASSP, page 1938-1942. IEEE, (2020)Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing., , , , and . IEEE Syst. J., 13 (3): 2918-2929 (2019)A blockchain-based authority management framework in traceability systems., , , , , and . Int. J. Comput. Sci. Eng., 24 (1): 42-54 (2021)Asynchronous Self-Triggered Stochastic Distributed MPC for Cooperative Vehicle Platooning Over Vehicular Ad-Hoc Networks., , , and . IEEE Trans. Veh. Technol., 72 (11): 14061-14073 (November 2023)What we achieve on text extractive summarization based on graph?, , , and . J. Intell. Fuzzy Syst., 43 (6): 7057-7065 (2022)Impact of Typhoon on Evaporation Duct in the Northwest Pacific Ocean., , , , , and . IEEE Access, (2019)