Tianhan Gao

According to our database1, Tianhan Gao authored at least 44 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
AIM: Activation increment minimization strategy for preventing bad information diffusion in OSNs.
Future Generation Comp. Syst., 2019

APPAS: A Privacy-Preserving Authentication Scheme Based on Pseudonym Ring in VSNs.
IEEE Access, 2019

A Dynamic Scene Recognition Method for Event-Based Social Network.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Emotion Recognition Scheme via EEG Signal Analysis.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Real-Time Ray Tracing Algorithm for Dynamic Scene.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

2018
An anonymous access authentication scheme for vehicular ad hoc networks under edge computing.
IJDSN, 2018

Independent Mix Zone for Location Privacy in Vehicular Networks.
IEEE Access, 2018

PAAS: PMIPv6 Access Authentication Scheme Based on Identity-Based Signature in VANETs.
IEEE Access, 2018

An Anonymous Authentication Scheme based on PMIPv6 for VANETs.
IEEE Access, 2018

Location Privacy Protection Scheme Based on Random Encryption Period in VANETs.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Improve Memory for Alzheimer Patient by Employing Mind Wave on Virtual Reality with Deep Learning.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

An Anonymous Access Authentication Scheme for VANETs Based on ID-Based Group Signature.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

Monocular Camera Tracking Curve Optimization Algorithm in Augmented Reality.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

A Pseudonym Ring Building Scheme for Anonymous Authentication in VANETs.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

2017
An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs.
Mobile Information Systems, 2017

SAAS: A Secure Anonymous Authentication Scheme for PMIPv6.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

An Anonymous Access Authentication Scheme for VANETs Based on ISGS.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

An Anonymous Authentication Scheme Based on Group IBS for PMIPv6 Network.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

2016
Random oracle-based anonymous credential system for efficient attributes proof on smart devices.
Soft Comput., 2016

Privacy-preserving and efficient attributes proof based on selective aggregate CL-signature scheme.
Int. J. Comput. Math., 2016

An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network.
Intelligent Automation & Soft Computing, 2016

Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network.
EURASIP J. Wireless Comm. and Networking, 2016

A Novel Hybrid Algorithm Based on Hill Matrix and Haar Domain Sequence.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

An Emergency Communication System Based on UAV-assisted Self-Organizing Network.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Access Authentication Schemes for PMIPV6: A Survey.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Indicator-Based Multi-objective Bacterial Foraging Algorithm with Adaptive Searching Mechanism.
Proceedings of the Bio-inspired Computing - Theories and Applications, 2016

2015
Secure Mobility Management for MIPv6 with Identity-Based Cryptography.
Proceedings of the Information and Communication Technology, 2015

2014
Privacy-Preserving Predicate Proof of Attributes with CL-Anonymous Credential.
J. Internet Serv. Inf. Secur., 2014

PPS: A privacy-preserving security scheme for multi-operator wireless mesh networks with enhanced user experience.
Comput. Sci. Inf. Syst., 2014

Anonymous Authentication Scheme Based on Proxy Group Signature for Wireless MESH Network.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature.
Mathematical and Computer Modelling, 2013

A hybrid approach to secure hierarchical mobile IPv6 networks.
Comput. Sci. Inf. Syst., 2013

Anonymity Scheme with Unlinkability Property in Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

BPVrfy: Hybrid Cryptographic Scheme Based - Federate Identity Attributes Verification Model for Business Processes.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Aggregated Privacy-Preserving Identity Verification for Composite Web Services.
Proceedings of the IEEE International Conference on Web Services, 2011

2009
A Distributed Security MIPv6 Model Based on Dynamic Policies.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
A Comprehensive Six-Dimensional Quality of Web Services Assessment Model.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

Policy-Based Distributed Security Management Scheme in MIPv6.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Trusted Assessment of Web Services Based on a Six-Dimensional QoS Model.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

A Trusted Quality of Web Services Management Framework Based on Six Dimensional QoWS Model and End-to-End Monitoring.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2007
Distributed and Scalable Event Correlation Based on Causality Graph.
Proceedings of the Managing Next Generation Networks and Services, 2007

2004
Distributed Plug-and-Play Network Management Model Based on Mobile Agents.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

A Self-Adapting Mobile Ipv6 Model Based on MAP.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004


  Loading...