Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Group Signature Scheme with Forward Security., , , and . Journal of Computer Research and Development, 43 (12): 2069-2075 (2006)An Approach for Service Discovery Based on Semantic Peer-to-Peer., , , and . ASIAN, volume 3818 of Lecture Notes in Computer Science, page 259-260. Springer, (2005)An Authentic Measurement Mechanism of Service for Trusted Grid., , , , , and . ChinaGrid, page 167-173. IEEE Computer Society, (2008)A secure mechanism of group communication for pervasive grid., , , and . IJAHUC, 4 (6): 344-353 (2009)An auditing mechanism for the security of service in grid., , , and . Concurrency and Computation: Practice and Experience, 27 (8): 2041-2053 (2015)A Control Mechanism about Quality of Service for Resource Scheduling in Multiple Virtual Machine System., , , and . PDCAT, page 518-523. IEEE Computer Society, (2010)Aeneas: real-time performance evaluation approach for distributed programs with reliability-constrains., , , , and . Cluster Computing, 10 (2): 175-186 (2007)Eidolon: Real-Time Performance Evaluation Approach for Distributed Programs Based on Capacity of Communication Links., , , , and . CIS, volume 3314 of Lecture Notes in Computer Science, page 136-141. Springer, (2004)Trusted virtual machine monitor-based group signature architecture., , , , and . IET Communications, 2 (10): 1311-1319 (2008)Java Multi Threaded Based Parallel Remote Sensing Image Interpretation in Desktop Grid., , , , and . ChinaGrid, page 51-59. IEEE Computer Society, (2010)