Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network., , , , and . IEEE Trans. Veh. Technol., 71 (4): 4336-4347 (2022)ThreshoWeb Security and Data Managementld Signature Scheme Based on Modular Secret Sharing., , and . CIS (2), page 442-445. IEEE Computer Society, (2008)978-0-7695-3508-1.FaceCloak: An Architecture for User Privacy on Social Networking Sites., , and . CSE (3), page 26-33. IEEE Computer Society, (2009)The Design and Research of the Internet of Things Technology in the Training of Spatial Navigation Ability of Patients with Mild Cognitive Impairment., , , , , , , , , and . CSE/EUC (2), page 305-309. IEEE Computer Society, (2017)Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks., , , , and . ISBAST, IEEE, (2013)Construction of national clinical research data center of Traditional Chinese medicine., , , , and . Healthcom, page 47-51. IEEE, (2012)Practical research of conceptual system framework based on TCM basic theory., , , and . Healthcom, page 357-360. IEEE, (2012)Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules., , and . RSKT, volume 4062 of Lecture Notes in Computer Science, page 604-609. Springer, (2006)Real-world clinical data mining on TCM clinical diagnosis and treatment: A survey., , , , and . Healthcom, page 88-93. IEEE, (2012)Tools and Benchmarks for Automated Log Parsing., , , , , , and . CoRR, (2018)