Author of the publication

A New Public Key Certificate Revocation Scheme Based on One-Way Hash Chain.

, , , and . WAIM, volume 3739 of Lecture Notes in Computer Science, page 670-675. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Self-Supervised Learning Model for Unknown Internet Traffic Identification Based on Surge Period., , and . Future Internet, 14 (10): 289 (2022)UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things., , , and . Remote. Sens., 13 (23): 4853 (2021)PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks., , , , and . NaNA, page 5-10. IEEE Computer Society, (2017)Computation offloading over multi-UAV MEC network: A distributed deep reinforcement learning approach., , , , , and . Comput. Networks, (2021)Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing., , , , , and . IEEE Trans. Ind. Informatics, 18 (11): 7935-7945 (2022)Cyberlogic Paves the Way From Cyber Philosophy to Cyber Science., , , , and . IEEE Internet Things J., 4 (3): 783-790 (2017)Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks., , , and . Sci. China Inf. Sci., (2021)Deep Low Light Image Enhancement Via Multi-Scale Recursive Feature Enhancement and Curve Adjustment., , and . ICASSP, page 1-5. IEEE, (2023)Asymmetric Group Key Agreement with Traitor Traceability., , and . CIS, page 347-351. IEEE Computer Society, (2010)Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health., , , , , , and . NaNA, page 319-324. IEEE, (2019)