Author of the publication

A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment.

, , , , , , , and . IEEE Internet Things J., 6 (2): 1484-1494 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CloudAC: a cloud-oriented multilayer access control system for logic virtual domain., , , , , and . IET Inf. Secur., 7 (1): 51-59 (2013)Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas., , , , , and . Secur. Commun. Networks, 5 (10): 1169-1180 (2012)A Skip-gram-based Framework to Extract Knowledge from Chinese Reviews in Cloud Environment., , , and . Mob. Networks Appl., 20 (3): 363-369 (2015)Defending Against Flow Table Overloading Attack in Software-Defined Networks., , , , , and . IEEE Trans. Serv. Comput., 12 (2): 231-246 (2019)Patch-Related Vulnerability Detection Based on Symbolic Execution., , , , , and . IEEE Access, (2017)CloudTB: A quick and reliable testbed for virtual machine based cloud computing systems., , , , and . CONIELECOMP, page 40-47. IEEE, (2015)Research on Group Signature Scheme with Forward Security., , , and . J. Comput. Res. Dev., 43 (12): 2069-2075 (2006)Reliability Analysis for Grid Computing., , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 787-790. Springer, (2004)A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing., , , , and . IPDPS Workshops, page 1210-1217. IEEE Computer Society, (2012)An Authentication and Access Control Framework for Group Communication Systems in Grid Environment., , , , and . AINA, page 547-554. IEEE Computer Society, (2007)