Author of the publication

Device-invisible two-factor authenticated key agreement protocol for BYOD.

, , , , and . ICCC, page 1-6. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT., , , , , , and . IEEE Internet of Things Journal, 6 (3): 4702-4710 (2019)Constrained Local Regularized Transducer for Multi-Component Category Classification., and . PRICAI, volume 5351 of Lecture Notes in Computer Science, page 521-532. Springer, (2008)On-line Writer Verification Using Force Features of Basic Strokes., , , , and . SINOBIOMETRICS, volume 3338 of Lecture Notes in Computer Science, page 646-653. Springer, (2004)An Algorithm for Enumerating SCCs in Web Graph., , , and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 655-667. Springer, (2005)Exploring in the weblog space by detecting informative and affective articles., , , , and . WWW, page 281-290. ACM, (2007)Advertising keyword suggestion based on concept hierarchy., , and . WSDM, page 251-260. ACM, (2008)Enhancing Relation Extraction by Eliciting Selectional Constraint Features from Wikipedia., , , and . NLDB, volume 4592 of Lecture Notes in Computer Science, page 329-340. Springer, (2007)Diversifying product search results., , , , and . SIGIR, page 1093-1094. ACM, (2011)Cross-Lingual Sentiment Classification via Bi-view Non-negative Matrix Tri-Factorization., , , and . PAKDD (1), volume 6634 of Lecture Notes in Computer Science, page 289-300. Springer, (2011)Real-Time Conflict Detection in Cooperative Plant Design System Combining Prior and Context., , , , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 204-214. Springer, (2007)