Author of the publication

Maintaining Root via Custom Android Kernel Across Over-The-Air Upgrade.

, , , , and . ICA3PP (1), volume 11334 of Lecture Notes in Computer Science, page 299-309. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices., , , , and . WISA, volume 12583 of Lecture Notes in Computer Science, page 334-346. Springer, (2020)A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration., , , , , and . J. Ambient Intell. Humaniz. Comput., 14 (10): 13661-13672 (October 2023)Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security., , , , and . ACNS Workshops, volume 12809 of Lecture Notes in Computer Science, page 332-345. Springer, (2021)Maintaining Root via Custom Android Kernel Across Over-The-Air Upgrade., , , , and . ICA3PP (1), volume 11334 of Lecture Notes in Computer Science, page 299-309. Springer, (2018)An authenticated hierarchical asymmetric group key agreement protocol based on identity., , , , and . Int. J. Embed. Syst., 11 (6): 815-824 (2019)A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application., , , , and . IEEE Access, (2018)On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation., , , , and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 381-399. Springer, (2020)Construction of a Dynamic Trust Ontology Model., , , , and . CIS (1), page 394-398. IEEE Computer Society, (2008)Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things., , , , , and . Int. J. Intell. Syst., 36 (1): 94-111 (2021)Prediction Algorithm for Network Security Situation based on BP Neural Network Optimized by SA-SOA., , , , and . Int. J. Perform. Eng., 16 (8): 1171-1182 (2020)