From post

An approach to quality assessment for web service selection based on the analytic hierarchy process for cases of incomplete information.

, , , и . Sci. China Inf. Sci., 58 (12): 1-14 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis on Variation and Factors of Water Resources Consumption Intensity in China., , и . Modeling Risk Management for Resources and Environment in China, Springer, (2011)Ridra: A Rigorous Decentralized Randomized Authentication in VANETs., , , , и . IEEE Access, (2018)SRDPV: secure route discovery and privacy-preserving verification in MANETs., , и . Wireless Networks, 25 (4): 1731-1747 (2019)Building a Secure Scheme for a Trusted Hardware Sharing Environment., , , , , и . IEEE Access, (2017)Smart Applications in Edge Computing: Overview on Authentication and Data Security., , , , и . IEEE Internet Things J., 8 (6): 4063-4080 (2021)Practical Secret Sharing Scheme Realizing Generalized Adversary Structure., и . J. Comput. Sci. Technol., 19 (4): 564-569 (2004)ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV., , , и . IEEE Internet Things J., 9 (22): 22903-22913 (2022)Fast and Secure Location-Based Services in Smart Cities on Outsourced Data., , , , , и . IEEE Internet Things J., 8 (24): 17639-17654 (2021)An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment., , , и . IEICE Trans. Inf. Syst., 93-D (3): 430-437 (2010)An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (3): 826-829 (2006)