Author of the publication

Leakage Resilient Provable Data Possession in Public Cloud Storage.

, , , and . IIH-MSP, page 706-709. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HTTP-SoLDiER: An HTTP-flooding attack detection scheme with the large deviation principle., , , , and . SCIENCE CHINA Information Sciences, 57 (10): 1-15 (2014)Research of an architecture of operating system kernel based on modularity concept., , , , , , and . Mathematical and Computer Modelling, 51 (11-12): 1421-1427 (2010)The application of the Six Sigma concept to port security process quality control., , , , and . Quality and Reliability Eng. Int., 23 (5): 631-639 (2007)Automatic Image-Based Pencil Sketch Rendering., , , , and . J. Comput. Sci. Technol., 17 (3): 347-355 (2002)Routing for cognitive radio networks consisting of opportunistic links., , , , , and . Wireless Communications and Mobile Computing, 10 (4): 451-466 (2010)Discussion on: "Closed-Loop Identification of MIMO Systems: A New Look at Identifiability and Experiment Design".. Eur. J. Control, 16 (3): 240-241 (2010)Human action categorization using Conditional Random Field., , , and . RiiSS, page 131-135. IEEE, (2011)SNKC: An Efficient On-the-Fly Pollution Detection Scheme for Content Distribution with Network Coding., , , and . HPCC/EUC, page 2298-2305. IEEE, (2013)New Adaptive Postprocessing to Remove Blocking Artifacts for DCT Coded Image., , and . SITIS, page 352-358. IEEE Computer Society, (2008)Analysis of Energy Consumption in Direct Transmission and Multi-hop Transmission for Wireless Sensor Networks., , , and . SITIS, page 275-280. IEEE Computer Society, (2007)