何德彪
开通时间:..
最后更新时间:..
点击次数:
发表刊物:IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 454-464, 2017
合写作者: Wei Wu, Kim-Kwang Raymond Choo, Neeraj Kumar,Debiao He
论文编号:13
是否译文:否
上一条:Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries
下一条:Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation