Author of the publication

A threshold hybrid encryption method for integrity audit without trusted center.

, , , , , and . J. Cloud Comput., 10 (1): 3 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of Scalable Admission Control., , , and . QoS-IP, volume 1989 of Lecture Notes in Computer Science, page 1-16. Springer, (2001)Public Data Integrity Verification Scheme for Secure Cloud Storage., , , and . Inf., 11 (9): 409 (2020)Unsupervised feature selection by non-convex regularized self-representation., , , , , and . Expert Syst. Appl., (2021)A study of pricing strategy for Mobile Internet service using clickstream data., , and . ISKE, page 283-286. IEEE, (2010)A New Perspective of Support Vector Clustering with Boundary Patterns., , , and . MCS, volume 7872 of Lecture Notes in Computer Science, page 224-235. Springer, (2013)A Multiple-Landmark Multicast Protocol Based on Location Information in Ad Hoc Networks., , and . ICNC (6), page 501-504. IEEE Computer Society, (2009)Extenics based Innovation of New Professional Farmer Cultivation under the Strategy of Rural Vitalization., , and . ITQM, volume 162 of Procedia Computer Science, page 131-138. Elsevier, (2019)Deep-sea image stitching: Using multi-channel fusion and improved AKAZE., , and . IET Image Process., 17 (14): 4061-4075 (2023)PEPFL: A framework for a practical and efficient privacy-preserving federated learning., , , , , and . Digit. Commun. Networks, 10 (2): 355-368 (2024)HLS parameter estimation for multi-input multi-output systems., , and . ICRA, page 857-861. IEEE, (2008)