Author of the publication

Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion without Precondition in Cloud Computing.

, , , , , and . ICC, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks., , , and . Wireless Personal Communications, 79 (2): 1277-1299 (2014)GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks., , , and . Wireless Personal Communications, 70 (4): 1793-1810 (2013)Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement., , and . Quantum Information Processing, 14 (11): 4245-4254 (2015)Securing Cooperative Spectrum Sensing Against Collusive False Feedback Attack in Cognitive Radio Networks., , , , and . IEEE Trans. Vehicular Technology, 67 (9): 8276-8287 (2018)Estimation of Forest Aboveground Biomass in Changbai Mountain Region Using ICESat/GLAS and Landsat/TM Data., , , , , , and . Remote Sensing, 9 (7): 707 (2017)Data integrity verification of the outsourced big data in the cloud environment: A survey., , , , and . J. Network and Computer Applications, (2018)EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices., , , , , and . IoT S&P@CCS, page 2-7. ACM, (2019)Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World., , , , , , , , , and . CoRR, (2022)An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks., , , and . ICC, page 857-862. IEEE, (2012)A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks., , , , and . Security and Communication Networks, 9 (13): 2002-2014 (2016)