Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network., , , , and . MSN, page 818-824. IEEE, (2021)High Radix Montgomery Modular Multiplier on Modern FPGA., , , and . TrustCom/ISPA/IUCC, page 1484-1489. IEEE Computer Society, (2013)ARPSSO: An OIDC-Compatible Privacy-Preserving SSO Scheme Based on RP Anonymization., , , , and . ESORICS (2), volume 14983 of Lecture Notes in Computer Science, page 268-288. Springer, (2024)Vulnerable Service Invocation and Countermeasures., , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (4): 1733-1750 (2021)Employing Smartwatch for Enhanced Password Authentication., , , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 691-703. Springer, (2017)How to Block the Malicious Access to Android External Storage., , , , , and . ICISC, volume 11396 of Lecture Notes in Computer Science, page 287-303. Springer, (2018)PIV4DB: Probabilistic Integrity Verification for Cloud Database., , , , and . ISCC, page 1-7. IEEE, (2020)MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker., , , , , and . SERE, page 119-128. IEEE, (2013)Mediated Hierarchical Identity-Based Combined Public Key Schemes., , , and . IITSI, page 614-618. IEEE Computer Society, (2010)