Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Counterexample of truncated Costas optical orthogonal codes., , and . IEEE Trans. Commun., 45 (6): 640-643 (1997)Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications., , , and . IEEE Trans. Multim., 22 (1): 82-95 (2020)A De-swinging Scheme in Location Privacy Protection via Smart Contract., , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 326-333. IEEE, (2021)Efficient Universally Composable Password-Based Key Exchange., , , and . CIS (2), page 293-298. IEEE Computer Society, (2008)978-0-7695-3508-1.ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing., , , and . Web Intelligence/IAT Workshops, page 315-318. IEEE Computer Society, (2007)Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis., , , , and . CSIE (6), page 490-494. IEEE Computer Society, (2009)An Application-Oriented Scheduling Optimization Algorithm for Internet-Based Virtual Computing Environment., , , , and . SOSE, page 347-352. IEEE Computer Society, (2013)A secure and efficient privacy-preserving data aggregation algorithm., , , and . J. Ambient Intell. Humaniz. Comput., 13 (3): 1495-1503 (2022)Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management., , , and . J. Softw., 8 (6): 1526-1535 (2013)Secure ABE Scheme for Access Management in Blockchain-Based IoT., , , , and . IEEE Access, (2021)