Author of the publication

Secure Access Method of Power Internet of Things Based on Zero Trust Architecture.

, , , , , and . ICSI (2), volume 13969 of Lecture Notes in Computer Science, page 386-399. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent radio map management for future WLAN indoor location fingerprinting., , , , and . WCNC, page 2769-2773. IEEE, (2012)The Repetitive Sequence Database and Mining Putative Regulatory Elements in Gene Promoter Regions., , , , and . J. Comput. Biol., 9 (4): 621-640 (2002)An evolutionary approach to fixed channel assignment problems with limited bandwidth constraint., , , and . ICC, page 2100-2104. IEEE, (2001)Innovative Wireless Dedicated Network for e-Bus., , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 1247-1256. Springer, (2013)A Channel Allocation Algorithm for large scale cellular networks., , and . ICPADS, page 465-470. IEEE Computer Society, (2002)Personal Paging Area Design Based On Mobiles Moving Behaviors., , and . INFOCOM, page 21-30. IEEE Comptuer Society, (2001)An Instant Messaging with Google Talk Handheld Devices Based on WEB2.0 for Tourist Call for Assistance., , , and . Mobile Data Management, page 385-386. IEEE Computer Society, (2009)Evaluating the Performance of a Distributed Database of Repetitive Elements in Complete Genomes., and . J. Inf. Sci. Eng., 18 (4): 533-539 (2002)Zigbee Positioning System for Smart Home Application., , , and . ISPA Workshops, volume 4743 of Lecture Notes in Computer Science, page 183-192. Springer, (2007)Location Query Based on Moving Behaviors., , and . DEXA, volume 2736 of Lecture Notes in Computer Science, page 297-307. Springer, (2003)