Author of the publication

An authenticated hierarchical asymmetric group key agreement protocol based on identity.

, , , , and . Int. J. Embed. Syst., 11 (6): 815-824 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and implementation of a cloud encryption transmission scheme supporting integrity verification., , , and . Int. J. Embed. Syst., 14 (3): 218-228 (2021)A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOA., , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 417-427. Springer, (2020)Design and Implementation of Intrusion Detection System Based on Neural Network., , , and . ICPCSEE (2), volume 1452 of Communications in Computer and Information Science, page 179-189. Springer, (2021)Echo State Network-Based Content Prediction for Mobile Edge Caching Networks., , , , and . Int. J. Inf. Technol. Web Eng., 18 (1): 1-16 (2023)Multi-level Cross-attention Siamese Network For Visual Object Tracking., , , , , and . KSII Trans. Internet Inf. Syst., 16 (12): 3976-3990 (2022)An Anomaly Detection Method Based on Normalized Mutual Information Feature Selection and Quantum Wavelet Neural Network., , , , and . Wireless Personal Communications, 96 (2): 2693-2713 (2017)A Model of Intrusion Prevention Base on Immune., , , and . IAS, page 441-444. IEEE Computer Society, (2009)An Improved Approximation Algorithm for a Class of Batch Scheduling Problems., , , and . ICIC (1), volume 6838 of Lecture Notes in Computer Science, page 612-618. Springer, (2011)An authenticated hierarchical asymmetric group key agreement protocol based on identity., , , , and . Int. J. Embed. Syst., 11 (6): 815-824 (2019)A Method of In-Depth-Defense for Network Security Based on Immunity Principles., , , and . ISPA, page 484-487. IEEE Computer Society, (2009)