Author of the publication

Understanding Content Voting Based on Social Foraging Theory.

, , and . IEEE Trans. Engineering Management, 64 (4): 574-585 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model., , and . Information, 6 (4): 576-591 (2015)Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud., , , , and . Trans. Comput. Collect. Intell., (2015)Solutions to the anti-piracy problem in oblivious transfer., , , and . J. Comput. Syst. Sci., 82 (3): 466-476 (2016)Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards., and . NSS, volume 7873 of Lecture Notes in Computer Science, page 549-562. Springer, (2013)Server-Aided Verification Signatures with Privacy., and . EIDWT, page 414-421. IEEE Computer Society, (2013)New ID-Based Signatures without Trusted PKG., and . WKDD, page 589-593. IEEE Computer Society, (2008)A Distributed Storage Middleware Based on HBase and Redis., , and . ChineseCSCW, volume 1330 of Communications in Computer and Information Science, page 364-380. Springer, (2020)An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure., , , and . J. Univers. Comput. Sci., 21 (3): 454-472 (2015)Server-Aided Verification Signature with Privacy for Mobile Computing., , , and . Mob. Inf. Syst., (2015)Online/Offline Attribute-Based Boolean Keyword Search For Internet Of Things., and . Comput. J., 66 (12): 2948-2960 (December 2023)