Author of the publication

Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System

, , and . CoRR, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks., , , , , and . ICC, page 1-6. IEEE, (2019)SRDPV: secure route discovery and privacy-preserving verification in MANETs., , and . Wireless Networks, 25 (4): 1731-1747 (2019)Measurement on the border effect of transboundary water resources: A case study of China's Zhanghe basin., , , and . SMC, page 1928-1934. IEEE, (2014)New Algorithms for Secure Outsourcing of Modular Exponentiations., , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 541-556. Springer, (2012)Continuous Authentication for the Internet of Things Using Channel State Information., , and . GLOBECOM, page 1-6. IEEE, (2019)Publicly verifiable database scheme with efficient keyword search., , , and . Inf. Sci., (2019)Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation., , , , , and . IEEE Trans. Serv. Comput., 16 (6): 3999-4011 (November 2023)Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks., , , , and . IEEE Trans. Serv. Comput., 16 (3): 2114-2125 (May 2023)A fair data access control towards rational users in cloud storage., , , , and . Inf. Sci., (2017)TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain., , , , and . IEEE Trans. Veh. Technol., 69 (6): 5784-5798 (2020)