Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence of Microcultural Information Flow on the Value Education in American Universities and its Countermeasures.. CIPAE, page 386-392. ACM, (2020)Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC., , , , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 397-415. Springer, (2019)Metrological Traceability of High Polarization Extinction Ratio (PER) Based on Precision Coaxial Rotating Polarization-Maintaining Fiber., , , , , , , , , and . IEEE Trans. Instrum. Meas., (2022)Enabling identity-based cloud storage public auditing with quantum computers resistance., , and . Int. J. Electron. Secur. Digit. Forensics, 8 (1): 82-98 (2016)ICT for Development in Rural India: A Longitudinal Study of Women's Health Outcomes., , and . MIS Q., (2020)Free gait generation based on discretization for a hexapod robot., , , and . ROBIO, page 2334-2338. IEEE, (2013)A Puncturing Algorithm for Mixing 2-Kernel and 3-Kernel Polar Codes., , , , and . WISATS (2), volume 281 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 323-332. Springer, (2019)Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks., , and . Int. J. Distributed Sens. Networks, (2015)Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems., , , , , and . J. Syst. Archit., (2022)ICAS: Two-factor identity-concealed authentication scheme for remote-servers., , , , , and . J. Syst. Archit., (2021)