Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks., , , , and . IJDSN, (2012)NetPro: detecting attacks in MANET routing with provenance and verification., , and . Sci. China Inf. Sci., 60 (11): 118101 (2017)Universally composable anonymous Hash certification model., , and . Sci. China Ser. F Inf. Sci., 50 (3): 440-455 (2007)Privacy-preserving federated k-means for proactive caching in next generation cellular networks., , , , , and . Inf. Sci., (2020)Privacy-preserving and high-accurate outsourced disease predictor on random forest., , , and . Inf. Sci., (2019)A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks., , , , and . IEEE Internet Things J., 4 (2): 546-554 (2017)New and efficient conditional e-payment systems with transferability., , , , and . Future Gener. Comput. Syst., (2014)A Collaborative Self-Governing Privacy-Preserving Wireless Sensor Network Architecture Based on Location Optimization for Dynamic Service Discovery in MANET Environment., , and . Int. J. Distributed Sens. Networks, (2015)Efficient and privacy-preserving skyline computation framework across domains., , , , and . Future Gener. Comput. Syst., (2016)Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification., , , , and . IEEE J. Biomed. Health Informatics, 20 (2): 655-668 (2016)