Author of the publication

TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism.

, , , , , and . TrustCom/ISPA/IUCC, page 1729-1734. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET., , , , , and . CoRR, (2013)Fine-Grained Refinement on TPM-Based Protocol Applications., , , , , , and . IEEE Trans. Information Forensics and Security, 8 (6): 1013-1026 (2013)Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing., , , and . TrustCom, page 100-108. IEEE Computer Society, (2012)TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism., , , , , and . TrustCom/ISPA/IUCC, page 1729-1734. IEEE Computer Society, (2013)Fast Similarity Search of Multi-Dimensional Time Series via Segment Rotation., , , , , and . DASFAA (1), volume 9049 of Lecture Notes in Computer Science, page 108-124. Springer, (2015)Integrity Verification for Outsourcing Uncertain Frequent Itemset Mining., , , and . CoRR, (2013)Magemite: Character inputting system based on magnetic sensor., , , , and . WOWMOM, page 1-3. IEEE Computer Society, (2015)A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET., , , , and . TrustCom, page 656-665. IEEE Computer Society, (2012)Parallelized Synchronous Multi-agent Deep Reinforcement Learning with Experience Replay Memory., , , , , and . SOSE, IEEE, (2019)