Author of the publication

From Mini House Game to Hobby-Driven Behavioral Biometrics-Based Password.

, , , , and . TrustCom/ISPA/IUCC, page 712-719. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Layered Grid User Expression Model in Grid User Management., , and . GCC (2), volume 3033 of Lecture Notes in Computer Science, page 1055-1058. Springer, (2003)A novel multi-satellite and multi-task scheduling method based on task network graph aggregation., , , , , and . Expert Syst. Appl., (2022)A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm., , , , , and . ISPEC, volume 8434 of Lecture Notes in Computer Science, page 217-231. Springer, (2014)Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds., , , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 67-87. Springer, (2020)VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts., , , and . IPCCC, page 1-9. IEEE, (2019)Modeling and analysis of droplet deposition behavior: From the micro and macro perspectives., , , , , , , , , and 3 other author(s). Comput. Electron. Agric., (July 2023)Adaptive Slide Window-Based Feature Cognition for Deceptive Information Identification., , , , and . IEEE Access, (2020)Clustering-Induced Generative Incomplete Image-Text Clustering (CIGIT-C)., , , , , and . CoRR, (2022)Supporting Efficient Dynamic Update in Public Integrity Verification of Cloud Data., , , and . IPCCC, page 1-12. IEEE, (2020)Performance Analysis for Workflow Management Systems under Role-Based Authorization Control., , and . GPC, volume 7296 of Lecture Notes in Computer Science, page 323-337. Springer, (2012)