Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deciding Recognizability under Dolev-Yao Intruder Model., and . ISC, volume 6531 of Lecture Notes in Computer Science, page 416-429. Springer, (2010)Stateless key distribution for secure intra and inter-group multicast in mobile wireless network., and . Comput. Networks, 51 (15): 4303-4321 (2007)An investigation of collaborations between top Chinese universities: a new quantitative approach., , and . Scientometrics, 98 (2): 1535-1545 (2014)Enhancing participant selection through caching in mobile crowd sensing., , , , and . IWQoS, page 1-10. IEEE, (2016)Secure and efficient access to outsourced data., , , and . CCSW, page 55-66. ACM, (2009)Lightweight Examination of DLL Environments in Virtual Machines to Detect Malware., and . SCC@AsiaCCS, page 10-16. ACM, (2016)Secure Group-Based Information Sharing in Mobile Ad Hoc Networks., and . ICC, page 1695-1699. IEEE, (2008)Investigation on Different Stator Structures of the Axial-Radial Flux Switched Reluctance Motors., , , , , , , and . IEEE Trans. Ind. Electron., 71 (6): 5474-5484 (June 2024)Wireless networking security: open issues in trust, management, interoperation and measurement., , and . Int. J. Secur. Networks, 1 (1/2): 84-94 (2006)Towards Diverse, Relevant and Coherent Open-Domain Dialogue Generation via Hybrid Latent Variables., , , , , and . AAAI, page 13600-13608. AAAI Press, (2023)