Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (11): 2805-2818 (2019)Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT., , , , and . IEEE Trans. Ind. Electron., 68 (12): 12921-12929 (2021)A New AES S-Box Equation System Based on BES., , , and . J. Inf. Hiding Multim. Signal Process., 6 (6): 1177-1184 (2015)Towards Multi-User, Secure, and Verifiable $k$NN Query in Cloud Database., , , , , , and . IEEE Trans. Knowl. Data Eng., 35 (9): 9333-9349 (September 2023)An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System., , , , , , and . IEEE Syst. J., 16 (4): 6569-6580 (2022)Isolation Modeling and Analysis Based on Mobility., , , , , , and . ACM Trans. Softw. Eng. Methodol., 28 (2): 10:1-10:31 (2019)Multi-factor based session secret key agreement for the Industrial Internet of Things., , , , , and . Ad Hoc Networks, (2023)Achieving Revocable Attribute Group-Based Encryption for Mobile Cloud Data: A Multi-Proxy Assisted Approach., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 2988-3001 (July 2023)PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 722-735 (2021)An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks., , , , and . IEEE Internet of Things Journal, 7 (4): 3462-3473 (2020)