Author of the publication

Integrated Synthesis of Control and Bandwidth Scheduling on Networked Control Systems.

, , , and . Computer and Information Science, 4 (3): 169-180 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust controller design on uncertain system., , , and . SMC, page 1888-1891. IEEE, (2001)Secure Cloud File System with Attribute Based Encryption., , and . INCoS, page 99-102. IEEE, (2013)Parallel Proxy-Signcryption Scheme in Cloud Environment., and . INCoS, page 402-406. IEEE, (2015)Certificateless multi-signcryption scheme in standard model., , and . Int. J. Grid Util. Comput., 9 (2): 120-127 (2018)An Evaluation Algorithm for Importance of Dynamic Nodes in Social Networks Based on Three-Dimensional Grey Relational Degree., , , and . ICPCSEE (2), volume 902 of Communications in Computer and Information Science, page 201-212. Springer, (2018)Certificateless Multi-signcryption Scheme in Standard Model., , and . INCoS, page 475-479. IEEE, (2016)Parallel Optimized Attribute-Based Encryption Scheme Based on SM9.. RICAI, page 873-877. ACM, (2022)RBF Model Based on the KECDBN., , , and . 3PGCIC, volume 13 of Lecture Notes on Data Engineering and Communications Technologies, page 199-205. Springer, (2017)Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure., , , and . SPDE, volume 1268 of Communications in Computer and Information Science, page 91-99. Springer, (2020)Further observation on proxy re-encryption with keyword search., , , , and . J. Syst. Softw., 85 (3): 643-654 (2012)