Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-performance XML modeling of parallel queries based on MapReduce framework., and . Clust. Comput., 19 (4): 1975-1986 (2016)EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment., , , , , , and . Peer-to-Peer Netw. Appl., 15 (5): 2179-2198 (2022)Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks., , , and . KSII Trans. Internet Inf. Syst., 13 (12): 6121-6144 (2019)Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction., , , and . IEEE Access, (2019)Intrusion Detection System for IoT Heterogeneous Perceptual Network., , , and . Mob. Networks Appl., 26 (4): 1461-1474 (2021)Authentication and Revocation Scheme for VANETs Based on Chinese Remainder Theorem., , , , and . HPCC/SmartCity/DSS, page 1541-1547. IEEE, (2019)Trust Inference Path Search with Minimum Uncertainty for E-Commerce., , and . IEEE WISA, page 133-137. IEEE Computer Society, (2013)An Improved Direct Trust Evaluation Algorithm for the Context-Aware Trust Model., , and . IMIS, page 196-201. IEEE Computer Society, (2013)Research on Building an ARM-Based Container Cloud Platform., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 107 (4): 654-665 (2024)A New Hybrid Image Encryption Algorithm Based on 2D-CA, FSM-DNA Rule Generator, and FSBI., , , , , and . IEEE Access, (2019)