Showing 1 - 20 results of 28 for search 'Jin CAO', query time: 0.04s
Refine Results
-
1
Privacy self-correlation privacy-preserving scheme in LBS by Weihao LI, Jin CAO, Hui LI
Published 2019-05-01
Article -
2
Efficient pairing-free CP-ABE based on ordered binary decision diagram by Sheng DING, Jin CAO, Hui LI
Published 2019-12-01
Article -
3
Overview of privacy preserving in social network by Rui-xin YAO, Hui LI, Jin CAO
Published 2016-04-01
Article -
4
Conditional privacy-protection remote user authentication mechanism for WBAN by Jin CAO, Yi-qing ZHENG, Hui LI
Published 2016-10-01
Article -
5
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks by Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI
Published 2023-02-01
Article -
6
-
7
-
8
A Non-interactive Key Exchange Scheme for Space-IntegratedGround Information Network Based on Blockchain by Mengru LIU, Yulong FU, Jin CAO, Hui LI
Published 2021-09-01
Article -
9
Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X by Yinghui ZHANG, Jiale QIAN, Jin CAO, Dong ZHENG
Published 2023-08-01
Article -
10
Research on security scenarios and security models for 6G networking by Chenglei ZHANG, Yulong FU, Hui LI, Jin CAO
Published 2021-02-01
Article -
11
Designing Dynamic Delivery Parking Spots in Urban Areas to Reduce Traffic Disruptions by Mireia Roca-Riu, Jin Cao, Igor Dakic, Monica Menendez
Published 2017-01-01
Article -
12
Imagined and Actual Acupuncture Effects on Chronic Low Back Pain: A Preliminary Study by Jin Cao, Scott P. Orr, Georgia Wilson, Jian Kong
Published 2020-01-01
Article -
13
-
14
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing by Yinghui ZHANG, Sirui ZHANG, Qiuxia ZHAO, Xiaokun ZHENG, Jin CAO
Published 2024-02-01
Article -
15
Electronic invoice public verification scheme based on SM2 coalition signature algorithm by Yurong LUO, Jin CAO, Hui LI, Xingwen ZHAO, Chao SHANG
Published 2022-04-01
Article -
16
Privacy-preserving photo sharing framework cross different social network by Fenghua LI, Zhe SUN, Ben NIU, Jin CAO, Hui LI
Published 2019-07-01
Article -
17
-
18
-
19
Enhanced Beidou user equipment access authentication protocol based on location key by Jin CAO, Qiuyu BU, Yuanyuan YANG, Hui LI, Qiao LIU, Maode MA
Published 2022-11-01
Article -
20
Access and Handover Authentication in Intermittent Connection Scenario of Satellite Network by Xiaoping SHI, Ruhui MA, Jin CAO, Hui LI, Lilan CHEN, Fenghua LI
Published 2021-09-01
Article