Author of the publication

SDC: Secure Data Collection for Time Based Queries in Tiered Wireless Sensor Networks.

, , , and . RTCSA, page 255-262. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Qin, Zhiguang
add a person with the name Qin, Zhiguang
 

Other publications of authors with the same name

SDC: Secure Data Collection for Time Based Queries in Tiered Wireless Sensor Networks., , , and . RTCSA, page 255-262. IEEE Computer Society, (2009)Formal Analysis for Security of Otway-Rees Protocol with BAN Logic., , , and . DBTA, page 590-593. IEEE Computer Society, (2009)Simulatability and Security of Certificateless Threshold Signatures without Random Oracles., , and . CIS (2), page 308-313. IEEE Computer Society, (2008)978-0-7695-3508-1.A probabilistic approach towards modeling email network with realistic features., , , , and . ICCCN, page 1-8. IEEE, (2014)Formal Verification of Communicating HSTM Designs., , , , and . CIT, page 383-390. IEEE Computer Society, (2012)Fast Community Discovery and Its Evolution Tracking in Time-Evolving Social Networks., , , , , and . ICDM Workshops, page 13-20. IEEE Computer Society, (2015)Propagation Model of Active Worms in P2P Networks., , , and . ICYCS, page 1908-1912. IEEE Computer Society, (2008)Improved Distributed Framework for Worm Detection & Throttling in Mobile Peer-to-Peer Networks., , , , and . JDCTA, 3 (2): 120-126 (2009)A co-commitment based secure data collection scheme for tiered wireless sensor networks., , , and . Journal of Systems Architecture - Embedded Systems Design, 57 (6): 655-662 (2011)An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment., , , , and . I. J. Network Security, 18 (3): 481-486 (2016)