Author of the publication

A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing.

, , , , and . Math. Comput. Model., 58 (5-6): 1175-1188 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing Survivability of Inter-domain Routing System under Cascading Failures., , , and . ICoC, volume 401 of Communications in Computer and Information Science, page 97-108. Springer, (2013)An Automatic Approach to Detect Anti-debugging in Malware Analysis., , , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 436-442. Springer, (2012)Improving application layer multicast forwarding performance by offloading multisend operations., and . Comput. Syst. Sci. Eng., (2015)Exploring potential vulnerabilities in data center network., , and . StudentWorkshop@CoNEXT, page 12:1-12:2. ACM, (2010)Distributed Opportunistic Scheduling in Cooperative Networks With RF Energy Harvesting., , , and . IEEE/ACM Trans. Netw., 28 (5): 2257-2270 (2020)An efficient distributed key management scheme for group-signature based anonymous authentication in VANET., , , and . Secur. Commun. Networks, 5 (1): 79-86 (2012)Implementation of TCP large receive offload on multi-core NPU platform., , and . ICTC, page 258-263. IEEE, (2016)An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications., , , , and . IEEE Trans. Veh. Technol., 59 (7): 3589-3603 (2010)Technology trends in large-scale high-efficiency network computing., , , , , , , , and . Frontiers Inf. Technol. Electron. Eng., 23 (12): 1733-1746 (2022)A New Hybrid Traffic Engineering Routing Algorithm for Bandwidth Guaranteed Traffic., , and . AINTEC, volume 4311 of Lecture Notes in Computer Science, page 159-171. Springer, (2006)