Author of the publication

An Identity-Based Authentication Model for Multi-domain in Grid Environment.

, , , and . CSSE (3), page 165-169. IEEE Computer Society, (2008)978-0-7695-3336-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Layered Secure Access Research for Space Network., , , and . ISCSCT (1), page 307-311. IEEE Computer Society, (2008)Self-Adaptive End-Point Mutation Technique Based on Adversary Strategy Awareness., , , , , , and . LCN, page 587-590. IEEE Computer Society, (2016)Moving Target Defense Techniques: A Survey., , , , and . Security and Communication Networks, (2018)A model for integrated spatial land use characteristics linking to surface nutrient concentration., and . Int. J. Digital Earth, 11 (10): 1064-1084 (2018)Multiobjective Optimal Dispatching of Smart Grid Based on PSO and SVM., , , , , and . Mob. Inf. Syst., (2022)A Method for Adaptive Resource Adjustment of Dynamic Service Function Chain., , , and . IEEE Access, (2018)Multilayer collaborative traceback technique based on net-flow fingerprint., , , , and . IJES, 8 (1): 1-11 (2016)A Global-Local Spectral Weight Network Based on Attention for Hyperspectral Band Selection., , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)VoIP Implementation and Experiments on a Mobile Wireless AdHoc Network., , and . ADHOCNETS, volume 28 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 537-548. Springer, (2009)Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis., , , and . Security and Communication Networks, (2018)