Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security extension for the Canetti-Krawczyk model in identity-based systems., , and . Science in China Series F: Information Sciences, 48 (1): 117-124 (2005)The Development Mode of Trust E-commerce Services., , , , and . ICEBE, page 181-187. IEEE Computer Society, (2009)Research on High-Precision Survey of Supercapacitor Capacity., , and . ISCID (2), page 219-222. IEEE Computer Society, (2011)UC-Secure Source Routing Protocol., , , and . IACR Cryptology ePrint Archive, (2009)Detection of Multi-Stage Attacks Based on Multi-Layer Long and Short-Term Memory Network., , , , and . ICC, page 1-6. IEEE, (2019)Active Matrix Color-LCD on 75µm Thick Flexible Glass Susbtrates, , , , , , and . IEEE, Journal of Display Technology (JDT), Vol. 8, No. 6, Pages 309-316, (2012)A Moving Weighted Harmonic Analysis Method for Reconstructing High-Quality SPOT VEGETATION NDVI Time-Series Data., , , , and . IEEE Trans. Geoscience and Remote Sensing, 53 (11): 6008-6021 (2015)Balancing trajectory privacy and data utility using a personalized anonymization model., , , and . J. Network and Computer Applications, (2014)On the Security of the Canetti-Krawczyk Model., , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 356-363. Springer, (2005)Analysis of the Authentication Protocols Based on Game Theory., , , , and . CIS, page 788-792. IEEE Computer Society, (2011)