Author of the publication

A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET.

, , , , , and . CoRR, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing., , , and . IEEE Trans. Information Forensics and Security, 10 (5): 889-899 (2015)Ideal Tightly Couple (t, m, n) Secret Sharing., , , , and . CoRR, (2019)Building Sentiment Lexicon with Representation Learning Based on Contrast and Label of Sentiment., , , , and . BigCom, page 156-161. IEEE Computer Society, (2018)Community detection in complex networks using flow simulation., , , , , , and . ICNCC, page 150-155. ACM, (2017)Sink-oriented tree based data dissemination protocol for mobile sinks wireless sensor networks., , , , , , and . Wireless Networks, 24 (7): 2723-2734 (2018)Semantic Network and Concept Mapping in Xhy Items., and . AIAI, volume 187 of IFIP, page 203-212. Springer, (2005)Corpus-Based Analysis of the Co-occurrence of Chinese Antonym Pairs., , , , and . ADMA (2), volume 6441 of Lecture Notes in Computer Science, page 500-507. Springer, (2010)Grid Coverage Algorithm & Analyzing for wireless sensor networks., , , and . Network Protocols & Algorithms, 6 (4): 1-18 (2014)Complex and flexible data access policy in attribute-based encryption., , , and . J. Supercomput., 78 (1): 1010-1029 (2022)Routing protocols classification for underwater wireless sensor networks based on localization and mobility., , , , and . Wirel. Networks, 28 (2): 797-826 (2022)