Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perceived and Actual Grasp Forces on Cylindrical Handles., , and . Hum. Factors, 49 (2): 292-299 (2007)IoT-based smart homes: A review of system architecture, software, communications, privacy and security., , and . Internet Things, (2018)Performance Analysis of the IOTA DAG-Based Distributed Ledger., , , , and . ACM Trans. Model. Perform. Evaluation Comput. Syst., 6 (3): 10:1-10:20 (2021)An Open Identity Authentication Scheme Based on Blockchain., , , , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 421-438. Springer, (2019)Spatio-temporal tensor completion for imputing missing internet traffic data., , , and . IPCCC, page 1-7. IEEE Computer Society, (2015)Characteristics of Cultivation and Domestication of a Sort of SRB Isolated from Landfill Leachate under Sulfite Condition., , , , , , and . ICBET, page 18-21. ACM, (2018)Personalized Friend Recommendation in Social Network Based on Clustering Method., , , and . ISICA, volume 316 of Communications in Computer and Information Science, page 84-91. Springer, (2012)Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data., , , , , and . ICA3PP (Workshops), volume 11338 of Lecture Notes in Computer Science, page 185-191. Springer, (2018)Searchable encryption scheme with limited search scope for group users., , , , and . NaNA, page 430-435. IEEE, (2020)Ciphertext storage scheme supporting data hierarchical management and control., , , , and . NaNA, page 205-212. IEEE, (2022)