Author:
Zhang Kuan,Liang Xiaohui,Baura Mrinmoy,Lu Rongxing,Shen Xuemin (Sherman)
Funder
Natural Science and Engineering Research Council
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference29 articles.
1. A. Aviv, M. Sherr, M. Blaze, J. Smith, Evading cellular data monitoring with human movement networks, in: USENIX Workshop on Hot Topics in Security (HotSec), 2010, pp. 1–6.
2. Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: the case of a gas refinery;Azadeh;Elsevier Inf. Sci.,2008
3. ESPAC: enabling security and patient-centric access control for ehealth in cloud computing;Barua;Int. J. Secur. Networks,2011
4. Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups;Boneh,2008
5. D. Boneh, X. Boyen, H. Shacham, Short Group Signatures, 2004. .
Cited by
85 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献