Author of the publication

Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks.

, , , , and . MSN, page 457-464. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rebuttal to "Comments on 'Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"'., , , and . IEEE Trans. Information Forensics and Security, 11 (4): 868 (2016)A Brief Survey on De-anonymization Attacks in Online Social Networks., , , and . CASoN, page 611-615. IEEE Computer Society, (2010)AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption, , and . CoRR, (2012)A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT., , , , , and . INFOCOM, page 1493-1501. IEEE, (2018)PRIDE: A Private and Decentralized Usage-Based Insurance Using Blockchain., , and . iThings/GreenCom/CPSCom/SmartData, page 1349-1354. IEEE, (2018)Anonymous Secure Routing in Mobile Ad-Hoc Networks., , , , and . LCN, page 102-108. IEEE Computer Society, (2004)Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks., , , , and . MSN, page 457-464. IEEE Computer Society, (2009)A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting., , , and . IEEE Trans. Multimedia, 15 (6): 1353-1364 (2013)De-Anonymizing Dynamic Social Networks., , , and . GLOBECOM, page 1-6. IEEE, (2011)Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks., , and . INFOCOM, page 73-81. IEEE, (2012)