Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elastic Scheduling of Virtual Machines in Cloudlet Networks., and . IPCCC, page 1-7. IEEE, (2021)Enabling Data Trustworthiness and User Privacy in Mobile Crowdsensing., , , , and . IEEE/ACM Trans. Netw., 27 (6): 2294-2307 (2019)FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2466-2483 (May 2023)A Lightweight Locally Repairable Code-based Storage Architecture for Blockchains., , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 2279-2283. IEEE, (2022)Image Data Embedding with Large Payload Based on Reference-Matrix., , and . IGTA, volume 525 of Communications in Computer and Information Science, page 55-62. Springer, (2015)CPWF: Cross-Platform Website Fingerprinting Based on Multi-Similarity Loss., , , , and . NaNA, page 73-80. IEEE, (2020)SDS2: Secure Data-Sharing Scheme for Crowd Owners in Public Cloud Service., and . DSC, page 22-29. IEEE Computer Society, (2017)A Rapid Certification Protocol from Bilinear Pairings for Vehicular Ad Hoc Networks., and . TrustCom, page 890-895. IEEE Computer Society, (2012)Fault and intrusion tolerance of wireless sensor networks., , , and . IPDPS, IEEE, (2006)A QoS Guarantee Framework for Cloud Services Based on Bayesian Prediction., , , and . CBD, page 117-124. IEEE Computer Society, (2015)