Author of the publication

Efficient trust chain model based on turing machine.

, and . Security and Communication Networks, 8 (1): 2-12 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aurora: A Cross-Layer Solution for Thermally Resilient Photonic Network-on-Chip., , , , , and . IEEE Trans. VLSI Syst., 23 (1): 170-183 (2015)Neighbor Gradient-based Multicast Routing for Service-Oriented Applications., , , , , and . TIIS, 6 (9): 2231-2252 (2012)Stability Criteria With Less LMI Variables for Neural Networks With Time-Varying Delay., , and . IEEE Trans. on Circuits and Systems, 55-II (11): 1188-1192 (2008)Hierarchical document classification using automatically generated hierarchy., , and . J. Intell. Inf. Syst., 29 (2): 211-230 (2007)Generalized energy-efficient algorithms for the RFID estimation problem., , , and . IEEE/ACM Trans. Netw., 20 (6): 1978-1990 (2012)Advanced modulation formats for short reach optical communication systems., , , , , and . IEEE Network, 27 (6): 6-13 (2013)Distributed Consensus for Multiagent Systems with Communication Delays and Limited Data Rate., , and . SIAM J. Control and Optimization, 49 (6): 2239-2262 (2011)Missing-Tag Detection and Energy-Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels., , , and . IEEE/ACM Trans. Netw., 22 (4): 1079-1091 (2014)An immunity based network security risk estimation.. Science in China Series F: Information Sciences, 48 (5): 557-578 (2005)Multi-Agent Consensus With Relative-State-Dependent Measurement Noises., , and . IEEE Trans. Automat. Contr., 59 (9): 2463-2468 (2014)