Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Traceable Attribute-Based Signature., , and . TrustCom, page 582-589. IEEE Computer Society, (2014)Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks., , , , and . Wireless Communications and Mobile Computing, (2018)Measuring the stability of scientific collaboration., , , , and . Scientometrics, 114 (2): 463-479 (2018)Energy-Aware Incentivized Data Dissemination via Wireless D2D Communications With Weighted Social Communities., and . TGCN, 2 (4): 945-957 (2018)Model Predictive Control for Mud Motor Operation in Directional Drilling., , , , and . ACC, page 5197-5202. IEEE, (2019)A user term visualization analysis based on a social question and answer log., and . Inf. Process. Manage., 49 (5): 1019-1048 (2013)Research and Practice on Constructing the Course of Programming Language., , and . CIT, page 2033-2038. IEEE Computer Society, (2010)A Survey on Privacy Frameworks for RFID Authentication., , , , , and . IEICE Transactions, 95-D (1): 2-11 (2012)An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment., , , , , , and . Wireless Communications and Mobile Computing, (2018)The Evolution of Springtime Water Vapor Over Beijing Observed by a High Dynamic Raman Lidar System: Case Studies., , , , , , , , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 10 (5): 1715-1726 (2017)