Author of the publication

PLAM: A privacy-preserving framework for local-area mobile social networks.

, , , and . INFOCOM, page 763-771. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Design of Online/Offline Signatures Based on Lattice., , , , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 198-212. Springer, (2018)FINE: A fine-grained privacy-preserving location-based service framework for mobile devices., , and . INFOCOM, page 244-252. IEEE, (2014)Micro-film Marketing of Chinese Tourism Destinations via Social Media: The Case of Shaoxing., , and . CEC, page 159-165. IEEE Computer Society, (2012)Family Cars' Life Cycle Cost (LCC) Estimation Model Based on the Neural Network Ensemble., , and . PROLAMAT, volume 207 of IFIP, page 610-618. Springer, (2006)Proxy Re-signature Schemes Without Random Oracles., , , and . INDOCRYPT, volume 4859 of Lecture Notes in Computer Science, page 197-209. Springer, (2007)RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security., , , and . ProvSec, volume 8782 of Lecture Notes in Computer Science, page 194-205. Springer, (2014)Identity-Based Conditional Proxy Re-Encryption., , , and . ICC, page 1-5. IEEE, (2011)Pairing-Based Two-Party Authenticated Key Agreement Protocol., , , and . IACR Cryptology ePrint Archive, (2005)A New Optimization Algorithm for HEVC., , , , and . ICIG (1), volume 9217 of Lecture Notes in Computer Science, page 218-228. Springer, (2015)How to Construct State Registries-Matching Undeniability with Public Security., , and . ACIIDS (1), volume 5990 of Lecture Notes in Computer Science, page 64-73. Springer, (2010)