Author of the publication

A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET.

, , , , , and . CoRR, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization., , , and . IJCCI, page 133-143. SciTePress, (2012)Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus., , , , and . Trustcom/BigDataSE/ISPA, page 42-49. IEEE, (2016)Differentially Private Geo-Social Ranking., , and . BigCom, page 250-254. IEEE, (2019)FLChain: A Blockchain for Auditable Federated Learning with Trust and Incentive., , , , and . BigCom, page 151-159. IEEE, (2019)KIMS: Kernel Integrity Measuring System based on TrustZone., , , and . BigCom, page 103-107. IEEE, (2020)Real-Time Multi-Modal People Detection and Tracking of Mobile Robots with A RGB-D Sensor., , , , and . ICARM, page 325-330. IEEE, (2019)High-Performance Organic Bulk-Heterojunction Solar Cells Based on Multiple-Donor or Multiple-Acceptor Components, , , , and . Advanced Materials, (2018)Efficient Planar Perovskite Solar Cells with Improved Fill Factor via Interface Engineering with Graphene, , , , , , , , , and 3 other author(s). Nano Letters, 18 (4): 2442--2449 (March 2018)Fast Similarity Search of Multi-Dimensional Time Series via Segment Rotation., , , , , and . DASFAA (1), volume 9049 of Lecture Notes in Computer Science, page 108-124. Springer, (2015)On reachable set estimation of multi-agent systems., , , , and . Neurocomputing, (2020)