Author of the publication

A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce.

, , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 1287-1294. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Families of Graphs With Unbounded Metric Dimension., , , , and . IEEE Access, (2019)Epigenetic reprogramming sensitizes immunologically silent EBV+ lymphomas to viral directed immunotherapy, , , , , , , , , and 9 other author(s). Blood, (March 2020)blood.2019004126.A Network-Based High Level Data Classification Technique., , , and . IJCNN, page 1-8. IEEE, (2018)MD-S3C3: A Medical Data Secure Sharing Scheme With Cloud and Chain Cooperation., , , , , and . Int. J. Digit. Crime Forensics, 15 (1): 1-24 (2023)FedAnchor: Enhancing Federated Semi-Supervised Learning with Label Contrastive Loss for Unlabeled Clients., , , , , , , , and . CoRR, (2024)Attacking Adversarial Attacks as A Defense., , , , , , , , and . CoRR, (2021)Img2Vec: A Teacher of High Token-Diversity Helps Masked AutoEncoders., , , , , , and . CoRR, (2023)Application of Internet of Things Technology in 3D Medical Image Model., and . IEEE Access, (2019)ACCL: Architecting Highly Scalable Distributed Training Systems With Highly Efficient Collective Communication Library., , , , , , , , , and 10 other author(s). IEEE Micro, 41 (5): 85-92 (2021)Detecting Bogus Messages in Vehicular Ad-Hoc Networks: An Information Fusion Approach., , , , and . CWSN, volume 812 of Communications in Computer and Information Science, page 191-200. Springer, (2017)