Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SFDHT: A DHT Designed for Server Farm., , , , , , and . GLOBECOM, page 1-8. IEEE, (2009)EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data., , and . IEEE Internet of Things Journal, 3 (2): 206-218 (2016)Computing security strategies in finite horizon repeated Bayesian games., , and . ACC, page 3664-3669. IEEE, (2017)Sequential public signaling in routing games with feedback information., , and . CDC, page 2735-2740. IEEE, (2018)Iterative Computation of Security Strategies of Matrix Games with Growing Action Set., and . Dynamic Games and Applications, 9 (4): 942-964 (2019)LP formulation of asymmetric zero-sum stochastic games., and . CDC, page 1930-1935. IEEE, (2014)Application research of MODIS data in monitoring land use change in Fujian., , , , , and . ICSDM, page 413-416. IEEE, (2011)Reliable and Scalable DHT-Based SIP Server Farm., , , and . GLOBECOM, page 1762-1767. IEEE, (2008)Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases., , , , and . IEEE Trans. Information Forensics and Security, 11 (8): 1847-1861 (2016)Transit-Stub Architecture for Peer-to-Peer SIP., , , , , and . EUROMICRO-SEAA, page 175-184. IEEE Computer Society, (2007)