Author of the publication

Wearable Ankle Robots in Post-stroke Rehabilitation of Gait: A Systematic Review.

, , , , , , , and . Frontiers Neurorobotics, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure three-party computational protocols for triangle area., , and . Int. J. Inf. Sec., 15 (1): 1-13 (2016)Privacy-preserving data utilization in hybrid clouds., , , , and . Future Gener. Comput. Syst., (2014)Wearable Ankle Robots in Post-stroke Rehabilitation of Gait: A Systematic Review., , , , , , , and . Frontiers Neurorobotics, (2019)Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption., , , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 592-609. Springer, (2013)M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 612-621. Springer, (2014)Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation., , and . IEEE Trans. Computers, 65 (8): 2363-2373 (2016)Secure Deduplication with Efficient and Reliable Convergent Key Management., , , , , and . IEEE Trans. Parallel Distributed Syst., 25 (6): 1615-1625 (2014)Identity-Based Chameleon Hash Scheme Without Key Exposure., , , and . IACR Cryptology ePrint Archive, (2009)Non-interactive Deniable Authentication Protocols., , and . Inscrypt, volume 7537 of Lecture Notes in Computer Science, page 142-159. Springer, (2011)An Almost Non-interactive Order Preserving Encryption Scheme., , , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 87-100. Springer, (2018)