Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Certificateless Signature from Pairings., , and . I. J. Network Security, 8 (1): 96-100 (2009)A novel model on dynamic resource allocation in optical networks., , , , , , and . Science in China Series F: Information Sciences, 48 (1): 15-27 (2005)Study and application of temporal index technology., , , , , and . Science in China Series F: Information Sciences, 52 (6): 899-913 (2009)An Automated Signature-Based Approach against Polymorphic Internet Worms., and . IEEE Trans. Parallel Distrib. Syst., 18 (7): 879-892 (2007)Defending against Internet worms: a signature-based approach., and . INFOCOM, page 1384-1394. IEEE, (2005)Extending soft sets with description logics., , , , and . Computers & Mathematics with Applications, 59 (6): 2087-2096 (2010)An interval type-2 fuzzy model of computing with words., and . Inf. Sci., (2014)Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms., , and . Computers & Security, 28 (8): 827-842 (2009)Study of AD HOC Network Access Single-Channel MAC Protocol and Hidden/Exposed Terminal., and . WGEC, page 689-692. IEEE Computer Society, (2009)Minimal role playing logic in Role-Based Collaboration., , , and . SMC, page 1420-1425. IEEE, (2014)