Author of the publication

Security and Privacy Analysis of Tree-LSHB+ Protocol.

, , , and . Wireless Personal Communications, 77 (4): 3125-3141 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on the Dynamic Mechanism of the Universities' Independent Innovation Based on Industry-University-Research Institute Alliance., and . ICEE, page 4628-4631. IEEE, (2010)Constructing confidence belief functions from one expert., and . Expert Syst. Appl., 36 (4): 8537-8548 (2009)Analyzing the applicability of Dempster's rule to the combination of interval-valued belief structures., and . Expert Syst. Appl., 38 (4): 4291-4301 (2011)Conjunctive combination of belief functions from dependent sources using positive and negative weight functions., and . Expert Syst. Appl., 41 (4): 1964-1972 (2014)Single-machine scheduling problem with resource dependent release dates to minimise total resource-consumption., , and . Int. J. Systems Science, 42 (10): 1811-1820 (2011)Foreign markets expansion for air medical transport business., , , and . JORS, 69 (7): 1146-1159 (2018)Particle Swarm Learning Algorithm Based on Adjustment of parameter and its Applications Assessment of Agricultural Projects., , and . CCTA (2), volume 294 of IFIP Advances in Information and Communication Technology, page 1379-1388. Springer, (2008)POS-RS: A Random Subspace method for sentiment classification based on part-of-speech analysis., , , , and . Inf. Process. Manage., 51 (4): 458-479 (2015)QoS-aware resource matching and recommendation for cloud computing systems., , , , and . Applied Mathematics and Computation, (2014)Distributed preference relations for multiple attribute decision analysis., , and . JORS, 67 (3): 457-473 (2016)