Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coverage Analysis of Cooperative Relaying for Urban Transportation Systems in Tunnels., and . ICC, page 1-6. IEEE, (2020)FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession., , , , and . IACR Cryptology ePrint Archive, (2013)Auditable Versioned Data Storage Outsourcing., and . CoRR, (2015)Data Integrity for Collaborative Applications over Hosted Services., and . ICDCS, page 1672-1682. IEEE Computer Society, (2017)Energy Cost Model for Frequent Item Set Discovery in Unstructured P2P Networks, , , , and . 26th International Symposium on Computer and Information Sciences, page 117-123. Springer London, (2011)Analysis and Optimization on FlexDPDP: A Practical Solution for Dynamic Provable Data Possession., , and . ICC, volume 8993 of Lecture Notes in Computer Science, page 65-83. Springer, (2014)F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid., , , , and . SmartGridComm, page 1-7. IEEE, (2019)LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems., , , , , , , and . IEEE Trans. Smart Grid, 13 (4): 3214-3226 (2022)Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems., , , , and . CoRR, (2023)On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers., , , , , and . CoRR, (2024)