Author of the publication

On the Confidential Auditing of Distributed Computing Systems.

, , , and . ICDCS, page 600-607. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A high-accuracy and lightweight detector based on a graph convolution network for strip surface defect detection., , , , , , , , and . Adv. Eng. Informatics, (2024)A Statistical Spam Filtering Scheme Based on Grid Platform., , and . IFSA (2), volume 42 of Advances in Soft Computing, page 527-534. Springer, (2007)Research on Collision Detection Algorithm Based on Particle Swarm Optimization., , and . Edutainment, volume 6249 of Lecture Notes in Computer Science, page 602-609. Springer, (2010)Pairing-Based Nominative Signatures with Selective and Universal Convertibility., and . Inscrypt, volume 6151 of Lecture Notes in Computer Science, page 60-74. Springer, (2009)Dynamic Integrity Verification of Cloud Storage Data Based on Data Proxy., , and . AIAM, page 517-522. ACM, (2020)Connectivity in finite ad-hoc networks., , , and . Sci. China Ser. F Inf. Sci., 51 (4): 417-424 (2008)A comprehensive evaluation of air pollution prediction improvement by a machine learning method., , , , , , and . SOLI, page 176-181. IEEE, (2015)Scheduling and bandwidth allocation for the distribution of archived video in VOD systems., , and . Telecommun. Syst., 9 (3-4): 335-355 (1998)Visual Tracking by Structurally Optimizing Pre-Trained CNN., , , and . IEEE Trans. Circuits Syst. Video Technol., 30 (9): 3153-3166 (2020)Stereo Visual SLAM Using Bag of Point and Line Word Pairs., , , , and . ICIRA (4), volume 11743 of Lecture Notes in Computer Science, page 651-661. Springer, (2019)