Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things., , , , and . Future Gener. Comput. Syst., (2014)基于可穿戴设备的心电图自适应分类算法研究 (Study on Patient-adaptive Algorithm for ECG Classification Based on Wearable Devices)., , and . 计算机科学, 46 (12): 292-297 (2019)State of the Art: Secure Mobile Payment., , and . IEEE Access, (2020)A Contourlet-Domain Image Signature for Content Authentication., , and . IIH-MSP, page 555-558. IEEE, (2013)Lebesgue-Sampling-Based Diagnosis and Prognosis for Lithium-Ion Batteries., , , , and . IEEE Trans. Ind. Electron., 63 (3): 1804-1812 (2016)Toward securing sensor clouds., , , and . CTS, page 280-289. IEEE, (2011)Secure cloud computing with brokered trusted sensor networks., , , and . CTS, page 581-592. IEEE, (2010)An overlapping window decorrelating multiuser detector for DS-CDMA radio channels., , and . IEEE Trans. Commun., 49 (8): 1488-1495 (2001)MVP and experimentation in software startups: a qualitative survey., , , , and . SEAA, page 322-325. IEEE, (2020)Privacy-preserving genomic computation through program specialization., , , , , and . ACM Conference on Computer and Communications Security, page 338-347. ACM, (2009)