Author of the publication

A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection and Identification of Stored-Grain Insects Using Deep Learning: A More Effective Neural Network., , , and . IEEE Access, (2020)A Method for Fuzzy Soft Sets in Decision-Making Based on an Ideal Solution., , and . Symmetry, 9 (10): 246 (2017)The Soft Sets and Fuzzy Sets-Based Neural Networks and Application., , , and . IEEE Access, (2020)Formal concept analysis based on the topology for attributes of a formal context., , , and . Inf. Sci., (2013)A Prediction Model Based on Gated Nonlinear Spiking Neural Systems., , , , and . Int. J. Neural Syst., 33 (6): 2350029:1-2350029:15 (2023)The relationship between soft sets and fuzzy sets and its application., , , and . J. Intell. Fuzzy Syst., 36 (4): 3751-3764 (2019)Application of Object Detection Algorithm in Identification of Rice Weevils and Maize Weevils., , , , , and . ICDLT, page 76-80. ACM, (2018)YOLO-TUF: An Improved YOLOv5 Model for Small Object Detection., , , and . IAIC (1), page 471-484. (2023)An Efficient Privacy-aware Authentication Scheme for Distributed Mobile Cloud Computing Services without Bilinear Pairings., , , , and . J. Inf. Sci. Eng., 35 (2): 341-360 (2019)A Parallel Convolutional Network Based on Spiking Neural Systems., , , , , and . Int. J. Neural Syst., 34 (5): 2450022:1-2450022:16 (May 2024)