Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices., , , , , and . Future Gener. Comput. Syst., (2022)Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification., , , and . KSII Trans. Internet Inf. Syst., 16 (8): 2507-2528 (2022)A Survey of Security Network Coding toward Various Attacks., , , , and . TrustCom, page 252-259. IEEE Computer Society, (2014)Charge-Depleting of the Batteries Makes Smartphones Recognizable., , , and . ICPADS, page 33-40. IEEE Computer Society, (2017)Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs., , , , , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 590-598. Springer, (2013)HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors., , , , and . ICICS (1), volume 12918 of Lecture Notes in Computer Science, page 136-152. Springer, (2021)WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices., , , , , and . IEEE Trans. Mob. Comput., 23 (6): 6997-7011 (June 2024)In-Network Historical Data Storage and Query Processing Based on Distributed Indexing Techniques in Wireless Sensor Networks., , , and . WASA, volume 5682 of Lecture Notes in Computer Science, page 264-273. Springer, (2009)EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data., , , , , , and . IEEE Trans. Serv. Comput., 13 (6): 1072-1085 (2020)