From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Research on CLPKC-IDPKC cross-domain identity authentication for IoT environment., , и . Comput. Commun., (2020)Anti-conspiracy attack threshold signature model and protocol., , , и . Int. J. Wirel. Mob. Comput., 17 (3): 300-306 (2019)Trusted connection architecture of Internet of Things oriented to perception layer., , , , , и . Int. J. Wirel. Mob. Comput., 12 (3): 224-231 (2017)An Efficient Malicious Code Detection System Based on Convolutional Neural Networks., , , , , и . CSAI/ICIMT, стр. 86-89. ACM, (2018)A Many-Objective Multistage Optimization-Based Fuzzy Decision-Making Model for Coal Production Prediction., , , , и . IEEE Trans. Fuzzy Syst., 29 (12): 3665-3675 (2021)Hierarchy Merkle tree wireless sensor network architecture., , , , , и . Int. J. Wirel. Mob. Comput., 12 (4): 341-348 (2017)Trusted data collection for Internet of Things., , , и . Concurr. Comput. Pract. Exp., (2021)A decentralized and reliable trust measurement for edge computing enabled Internet of Things., , и . Concurr. Comput. Pract. Exp., (2022)Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios., , , и . ICCNS, стр. 64-68. ACM, (2022)Identity-based Linkable Blind Ring Signature Scheme on Lattice., , , , , , , и . ICCNS, стр. 51-57. ACM, (2022)