Search for persons
X
?
Frontier Computing on Industrial Applications Volume 4; Lecture Notes in Electrical Engineering ,
1
New Group-Key-Based Over the Air (OTA) Update Model Facilit..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
3
POSTER: Integration of End-to-End Security and Lightweight-..:
, In:
?
2023 5th International Conference on Computer Communication and the Internet (ICCCI) ,
4
Leakage-Resilient Anonymous Multi-Receiver Outsourced Revoc..:
, In:
?
Science of Cyber Security; Lecture Notes in Computer Science ,
6
Design of End-To-End Security for MQTT 5.0:
, In:
?
2021 IEEE Conference on Dependable and Secure Computing (DSC) ,
9
Highly Efficient Anonymous IoT Authentication using Composi..:
, In:
?
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) ,
14
Exploration of Fast Edible Oil Classification Using Infrare..:
, In:
?
Security with Intelligent Computing and Big-data Services; Advances in Intelligent Systems and Computing ,
15