Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SAVM: A practical secure external approach for automated in-VM management., , , and . Concurr. Comput. Pract. Exp., (2019)Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism., and . J. Supercomput., 75 (9): 5965 (2019)Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge., , , , , and . SecureComm, volume 238 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 530-549. Springer, (2017)A Novel Dynamic Self-adaptive Framework for Network Security Evaluation., , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 604-612. Springer, (2012)Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game., , , , and . ICA3PP, volume 10393 of Lecture Notes in Computer Science, page 313-327. Springer, (2017)Linear Nondeterministic Dawg String Matching Algorithm., and . SPIRE, volume 3246 of Lecture Notes in Computer Science, page 70-71. Springer, (2004)Efficient Revenue Maximization for Viral Marketing in Social Networks., , , , and . ADMA, volume 10604 of Lecture Notes in Computer Science, page 209-224. Springer, (2017)An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection., , , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 346-347. Springer, (2009)A Cloud Access Security Broker based approach for encrypted data search and sharing., , , , and . ICNC, page 422-426. IEEE Computer Society, (2017)Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 853-862. Springer, (2005)