Author of the publication

A Secure Data Self-Destructing Scheme in Cloud Computing.

, , , , , , and . IEEE Trans. Cloud Computing, 2 (4): 448-458 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic reading system based on automatic alignment control for pointer meter., , , , and . IECON, page 3414-3418. IEEE, (2014)Efficient execution of speculative threads and transactions with hardware transactional memory., , , , and . Future Generation Comp. Syst., (2014)IDR/QR: An Incremental Dimension Reduction Algorithm via QR Decomposition., , , , , and . IEEE Trans. Knowl. Data Eng., 17 (9): 1208-1222 (2005)Novel linear search for support vector machine parameter selection., , , , , and . Journal of Zhejiang University - Science C, 12 (11): 885-896 (2011)Toward a practical approach for BGP stability with root cause check., , , , and . J. Parallel Distrib. Comput., 71 (8): 1098-1110 (2011)Safe and Practical Energy-Efficient Detour Routing in IP Networks., , , , , and . IEEE/ACM Trans. Netw., 22 (6): 1925-1937 (2014)A novel method of infrared image denoising and edge enhancement., , and . Signal Processing, 88 (6): 1606-1614 (2008)An evaluation of identity representability of facial expressions using feature distributions., , and . Neurocomputing, 71 (10-12): 1902-1912 (2008)A Sub-1V High-PSRR Piecewise-Linear Bandgap Reference., , , , , , and . JCP, 9 (5): 1274-1281 (2014)Priority-based squash reducing methods in thread level speculation., , , , , , , and . IJITCC, 2 (2): 138-154 (2012)