Author of the publication

Privacy-preserving scheme in social participatory sensing based on Secure Multi-party Cooperation.

, , , , , , and . Comput. Commun., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-Latency Tradeoff for Energy-Aware Offloading in Mobile Edge Computing Networks., , , , , , , and . IEEE Internet of Things Journal, 5 (4): 2633-2645 (2018)An optimisation-based approach for wireless sensor deployment in mobile sensing environments., , , and . WCNC, page 2108-2112. IEEE, (2012)Quality-Of-Information Aware Data Delivery for Wireless Sensor Networks: Description and Experiments., and . WCNC, page 1-6. IEEE, (2010)Wireless sensor network deployment in mobile phones assisted environment., , and . IWQoS, page 1-9. IEEE, (2010)Privacy-aware probabilistic sampling for data collection in wireless sensor networks., , and . IWCMC, page 314-319. IEEE, (2011)Wireless sensor deployment for collaborative sensing with mobile phones., , and . Comput. Networks, 55 (15): 3224-3245 (2011)Energy-efficient automatic location-triggered applications on smartphones., and . Comput. Commun., (2014)An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks., , and . Comput. Commun., 30 (11-12): 2353-2364 (2007)Vulnerable Friend Identification: Who Should You Beware of Most in Online Social Networks?, , , , , and . GLOBECOM, page 1-6. IEEE, (2015)Guest Editorial Special Issue on Cloud Computing for IoT., , , and . IEEE Internet of Things Journal, 3 (3): 254-256 (2016)