Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Review Sharing., , , , , , , and . SANER, page 61-72. IEEE, (2019)Provably Secure Searchable Attribute-Based Authenticated Encryption Scheme., and . Int. J. Netw. Secur., 21 (2): 177-190 (2019)A DASH-Based Peer-to-Peer VoD Streaming Scheme., , , and . ChinaCom (1), volume 312 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 402-416. Springer, (2019)MOPSO-based Data Scheduling Scheme for P2P Streaming Systems., , , , and . KSII Trans. Internet Inf. Syst., 13 (10): 5013-5034 (2019)Super Peer-Based P2P VoD Architecture for Supporting Multiple Terminals., , , and . ICPCSEE (1), volume 1257 of Communications in Computer and Information Science, page 389-404. Springer, (2020)Verifiable Attribute-Based Multi-keyword Search over Encrypted Cloud Data in Multi-owner Setting., and . DSC, page 441-449. IEEE Computer Society, (2017)High-Frequency Keywords to Predict Defects for Android Applications., , , , and . COMPSAC (2), page 442-447. IEEE Computer Society, (2018)978-1-5386-2667-2.Research on Student Model Construction of Educational Big Data System Based on CD-CAT., , and . WiMob, page 303-308. IEEE, (2018)