Author of the publication

Security analysis of a publicly verifiable data possession scheme for remote storage.

, , , and . J. Supercomput., 73 (11): 4923-4930 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fixed-time tracking control of manipulators based on non-singular fast terminal sliding surface., , , and . J. Intell. Fuzzy Syst., 46 (1): 2971-2979 (January 2024)Security analysis of a publicly verifiable data possession scheme for remote storage., , , and . J. Supercomput., 73 (11): 4923-4930 (2017)DynSTGAT: Dynamic Spatial-Temporal Graph Attention Network for Traffic Signal Control., , , and . CIKM, page 2150-2159. ACM, (2021)New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment., , , and . Secur. Commun. Networks, (2018)A Multi-objective Reinforcement Learning Perspective on Internet Congestion Control., , , , , , and . IWQoS, page 1-10. IEEE, (2021)CCPO: Conservatively Constrained Policy Optimization Using State Augmentation., , , , and . ECAI, volume 372 of Frontiers in Artificial Intelligence and Applications, page 2599-2606. IOS Press, (2023)A Spatial-Temporal Graph Attention Network for Multi-intersection Traffic Light Control., , , , , and . IJCNN, page 1-8. IEEE, (2021)Capturing Local and Global Spatial-Temporal Correlations of Spatial-Temporal Graph Data for Traffic Flow Prediction., , , , and . IJCNN, page 1-8. IEEE, (2022)Flexible Advance Reservation for Grid Computing., , , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 241-248. Springer, (2004)A Resource Discovery Algorithm with Probe Feedback Mechanism Based on Advance Reservation., , , and . GCC, page 281-286. IEEE Computer Society, (2006)