Author of the publication

User Features-aware Trust Measurement of Cloud Services via Evidence Synthesis for Potential Users.

, and . DMS, page 175-181. Knowledge Systems Institute Graduate School, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing., , , and . J. UCS, 19 (16): 2349-2367 (2013)Distributed Event-Triggered Trust Management for Wireless Sensor Networks., , , , and . IAS, page 291-294. IEEE Computer Society, (2009)Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems., , , , and . IEEE Access, (2019)Efficient verifiable fuzzy keyword search over encrypted data in cloud computing., , , , , , and . Comput. Sci. Inf. Syst., 10 (2): 667-684 (2013)A New Efficient Verifiable Fuzzy Keyword Search Scheme., , , , , , and . JoWUA, 3 (4): 61-71 (2012)Exploiting PUF Models for Error Free Response Generation., , , , , , , and . CoRR, (2017)PCA-derived respiratory motion surrogates from X-ray angiograms for percutaneous coronary interventions., , , , and . Int. J. Comput. Assist. Radiol. Surg., 10 (6): 695-705 (2015)PUF Sensor: Exploiting PUF Unreliability for Secure Wireless Sensing., , , and . IEEE Trans. on Circuits and Systems, 64-I (9): 2532-2543 (2017)A Novel Approach to Network Security Situation Assessment Based on Attack Confidence., , , , , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 450-463. Springer, (2017)Analysis of Enterprise Workflow Solutions., , , , and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 680-687. Springer, (2009)