Author of the publication

Secure Access Method of Power Internet of Things Based on Zero Trust Architecture.

, , , , , and . ICSI (2), volume 13969 of Lecture Notes in Computer Science, page 386-399. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Innovative Wireless Dedicated Network for e-Bus., , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 1247-1256. Springer, (2013)An evolutionary approach to fixed channel assignment problems with limited bandwidth constraint., , , and . ICC, page 2100-2104. IEEE, (2001)Intelligent radio map management for future WLAN indoor location fingerprinting., , , , and . WCNC, page 2769-2773. IEEE, (2012)An Instant Messaging with Google Talk Handheld Devices Based on WEB2.0 for Tourist Call for Assistance., , , and . Mobile Data Management, page 385-386. IEEE Computer Society, (2009)A Channel Allocation Algorithm for large scale cellular networks., , and . ICPADS, page 465-470. IEEE Computer Society, (2002)Personal Paging Area Design Based On Mobiles Moving Behaviors., , and . INFOCOM, page 21-30. IEEE Comptuer Society, (2001)A decomposition approach for fixed channel assignment problems in large-scale cellular networks., , and . J. Commun. Networks, 5 (1): 43-54 (2003)Human behavior recognition from arbitrary views., , , , and . ISCAS, page 2654-2657. IEEE, (2010)Portable Patient Information Integration System for Patient Safety Improvement., , , , and . ISPA Workshops, volume 4743 of Lecture Notes in Computer Science, page 87-95. Springer, (2007)A hierarchical routing protocol for large scale ad hoc network., , and . IPCCC, page 379-385. IEEE, (1999)