Author of the publication

An efficient dynamic-identity based signature scheme for secure network coding.

, , , , and . Comput. Networks, 54 (1): 28-40 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Things Based Smart Grids Supported by Intelligent Edge Computing., , , , , , , and . IEEE Access, (2019)A Sketch-Based Fine-Grained Proportional Integral Queue Management Method., , , , , and . Axioms, 12 (9): 814 (September 2024)Providing key recovery capability for mobile communications., , , , and . Secur. Commun. Networks, 3 (2-3): 207-216 (2010)A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing., , , , and . IEEE Trans. Cloud Comput., 7 (2): 383-391 (2019)An efficient dynamic-identity based signature scheme for secure network coding., , , , and . Comput. Networks, 54 (1): 28-40 (2010)Four-Vector Phase Model Predictive Voltage Control for Half-Centralized Open-End Winding Permanent-Magnet Linear Motor Systems., , , , and . IEEE Trans. Veh. Technol., 71 (9): 9338-9349 (2022)Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication., , , , , , , , and . IEEE Access, (2019)Empirical Studies in Decision Rule-Based Flexibility Analysis for Complex Systems Design and Management., , and . CSDM, page 171-185. Springer, (2016)Graph-Based Time Series Edge Anomaly Detection in Smart Grid., , , , and . BigDataSecurity, page 1-6. IEEE, (2021)A Collaborative Jamming Algorithm Based on Multi-UAV Scheduling., , , , , and . ICCT, page 372-377. IEEE, (2023)