Author of the publication

A Novel Message Authentication Scheme With Absolute Privacy for the Internet of Things Networks.

, , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The productivity effects of local R&D outsourcing: the moderating role of subsidiary mandate and internal R&D., , and . Technol. Anal. Strateg. Manag., 27 (10): 1239-1254 (2015)Subway tunnels identification through Cosmo-SkyMed PSInSAR analysis in Shanghai., , and . IGARSS, page 1267-1270. IEEE, (2011)Feasible Life Extension Concept for Aged Tactical Simulation System by HLA Architecture Design., and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 713-719. Springer, (2013)A Qualitative Study of Web-Based Knowledge Communities: Examining Success Factors., , and . IJeC, 5 (3): 39-57 (2009)Spatial Data Handling for ITS: Perspective, Issues and Approaches., and . GeoInformatica, 4 (2): 215-230 (2000)A semi-empirical backscattering model for estimation of leaf area index (LAI) of rice in southern China., , , , and . IGARSS, page 3667-3680. IEEE, (2007)GIS in urban cultural studies: reflections from the project on Republican Beijing., , , and . Ann. GIS, 18 (1): 81-92 (2012)StenUNet: Automatic Stenosis Detection from X-ray Coronary Angiography., , , and . CoRR, (2023)DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing., , , , and . Future Gener. Comput. Syst., (2018)Combine Pathway Analysis with Random Forests to Hunting for Feature Genes., , , , , , , and . BMEI, page 1-5. IEEE, (2009)