Author of the publication

A core-stateless IP mobility management scheme based on OpenFlow protocol.

, , , and . IWCMC, page 1117-1122. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A User-Based Document Management Mechanism in Cloud., , , , and . CIS, page 377-381. IEEE Computer Society, (2014)Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation., , , , and . ICNC, page 1-6. IEEE Computer Society, (2016)Time obfuscation-based privacy-preserving scheme for location-based services., , , , and . WCNC, page 1-6. IEEE, (2016)Protection of location privacy in continuous LBSs against adversaries with background information., , , , and . ICNC, page 1-6. IEEE Computer Society, (2016)A practical group matching scheme for privacy-aware users in mobile social networks., , , , , and . WCNC, page 1-6. IEEE, (2016)Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System., , , , , and . ICCCN, page 1-9. IEEE, (2018)Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game., , , , and . ICA3PP, volume 10393 of Lecture Notes in Computer Science, page 313-327. Springer, (2017)Design of Multi Cipher Processing Architecture for Random Cross Access., , , and . Microprocessors and Microsystems - Embedded Hardware Design, (2018)Privacy Computing: Concept, Computing Framework And Future Development Trends., , , and . IACR Cryptology ePrint Archive, (2018)Pricing Privacy Leakage in Location-Based Services., , , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 406-418. Springer, (2017)