Author of the publication

Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol.

, and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 500-510. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Task Driven Basketball Teaching Mode Based on ITbegin Cloud Platform.. ICMTEL (2), volume 327 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 92-104. Springer, (2020)Method of Sports Assistant Teaching Based on Multimedia Network.. ICMTEL (2), volume 327 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 105-115. Springer, (2020)Enhancement of motor cortex EEG during motor imagery: a visual feedback training study., , , , , and . CIVEMSA, page 1-5. IEEE, (2019)Minimum cost consensus models based on random opinions., , and . Expert Syst. Appl., (2017)Roaming electric vehicle charging and billing: An anonymous multi-user protocol., , , and . SmartGridComm, page 939-945. IEEE, (2014)A Fuzzy Assessment Model for Traffic Safety in City: A Case Study in China., , and . AICI (2), volume 6320 of Lecture Notes in Computer Science, page 168-174. Springer, (2010)An Enhanced Approach to Supporting Controlled Access to EPRs with Three Levels of Identity Privacy Preservations., and . USAB, volume 7058 of Lecture Notes in Computer Science, page 547-561. Springer, (2011)Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol., and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 500-510. Springer, (2014)Rethinking the Defocus Blur Detection Problem and a Real-Time Deep DBD Model., and . ECCV (10), volume 12355 of Lecture Notes in Computer Science, page 617-632. Springer, (2020)BSIS: Blockchain-Based Secure Incentive Scheme for Energy Delivery in Vehicular Energy Network., , and . IEEE Trans. Ind. Informatics, 15 (6): 3620-3631 (2019)