Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Anonymous Communication Protocol Based on Group Signature., , , , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 175-181. Springer, (2019)Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature., , , , , and . Concurr. Comput. Pract. Exp., (2022)Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing., , , , , , and . IEEE Access, (2020)Research on Blind Signature Based Anonymous Electronic Cash Scheme., , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 386-392. Springer, (2020)Research and Application of Digital Signature Technology., , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 540-546. Springer, (2020)Evaluation of Machine Learning Algorithms for Anomaly Detection., , , and . Cyber Security, page 1-8. IEEE, (2020)An Anonymous Communication Scheme Between Nodes Based on Pseudonym and Bilinear Pairing in Big Data Environments., , and . DMBD (1), volume 1453 of Communications in Computer and Information Science, page 169-182. Springer, (2021)A Group Blind Signature Scheme for Privacy Protection of Power Big Data in Smart Grid., , and . DMBD (1), volume 1453 of Communications in Computer and Information Science, page 23-34. Springer, (2021)A Secure Aggregation Routing Protocol with Authentication and Energy-Saving on Data Mining and Big Data., , and . DMBD (1), volume 1453 of Communications in Computer and Information Science, page 192-204. Springer, (2021)Privacy Protection of Cloud Computing Based on Strong Forward Security., , and . Int. J. Cloud Appl. Comput., 13 (1): 1-9 (2023)