Author of the publication

An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.

, , , , , and . Sensors, 18 (5): 1663 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method of Deduplication for Data Remote Backup., , , , and . CCTA (1), volume 344 of IFIP Advances in Information and Communication Technology, page 68-75. Springer, (2010)Optimal robust Bayes estimation, and . Journal of Statistical Planning and Inference, 46 (3): 365--380 (Aug 15, 1995)The information hiding mechanism based on compressed document format., , , , and . IJCSM, 6 (1): 97-106 (2015)Free Adversarial Training with Layerwise Heuristic Learning., , , , , and . ICIG (2), volume 12889 of Lecture Notes in Computer Science, page 120-131. Springer, (2021)OM-TCN: A dynamic and agile opponent modeling approach for competitive games., , , , and . Inf. Sci., (2022)An Efficient Bounded Model Checking Approach for Web Service Composition., , , , , and . Mob. Networks Appl., 26 (4): 1503-1513 (2021)Optimizing the restoration performance of deduplication systems through an energy-saving data layout., , , , , and . Ann. des Télécommunications, 74 (7-8): 461-471 (2019)Code Decoupling Execution Isolating Based on TF Card Firmware Extension., , , , , , and . DSC, page 403-408. IEEE, (2021)Research on Evasion and Detection of Malicious JavaScript Code., , , and . ML4CS, volume 14541 of Lecture Notes in Computer Science, page 104-130. Springer, (2023)Dataflow optimization with layer-wise design variables estimation method for enflame CNN accelerators., , , , , and . J. Parallel Distributed Comput., (2024)