Author of the publication

A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks.

, , , , and . CIT, page 2837-2842. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Auditable Attribute-Based Credentials Scheme and Its Applications in Contact Tracing., , , and . IACR Cryptol. ePrint Arch., (2023)Diabetes Classification Based on Machine Learning Model.. DSIT, page 149-156. IEEE, (2023)Protecting Router Forwarding Table in Space., , , and . MSN, page 446-450. IEEE Computer Society, (2011)Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing., , , and . ACNS (1), volume 14583 of Lecture Notes in Computer Science, page 88-118. Springer, (2024)How to Prove Work: With Time or Memory., , and . IEEE Access, (2022)Environmental Adaptive Privacy Preserving Contact Tracing System for Respiratory Infectious Diseases., , , , , and . CSS, volume 13172 of Lecture Notes in Computer Science, page 131-144. Springer, (2021)Application of UAV-Captured Image Inspection Based on Convolutional Neural Networks Tower Image Recognition and Defect Detection., , , , , and . ICITEE, page 386-390. ACM, (2023)Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning., , and . NSS, volume 13983 of Lecture Notes in Computer Science, page 114-136. Springer, (2023)An Attention Mechanism-Based Microservice Placement Scheme for On-Star Edge Computing Nodes., , , , , and . IEEE Access, (2023)How to Prove Work: With Time or Memory., , and . IEEE ICBC, page 1-3. IEEE, (2021)