Tu Peng
Orcid: 0000-0003-3436-7049
According to our database1,
Tu Peng
authored at least 25 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT.
IEEE Syst. J., March, 2023
2022
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services.
IEEE Trans. Cloud Comput., 2022
2020
Implementation of High-Performance Blockchain Network Based on Cross-Chain Technology for IoT Applications.
Sensors, 2020
2019
An Efficient Privacy-aware Authentication Scheme for Distributed Mobile Cloud Computing Services without Bilinear Pairings.
J. Inf. Sci. Eng., 2019
A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures.
IEEE Access, 2019
2018
A Realistic Distributed Conditional Privacy- Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Access, 2018
2017
A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.
Sensors, 2017
An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
KSII Trans. Internet Inf. Syst., 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017
2014
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014
2012
Proceedings of the 2012 IEEE International Conference on Granular Computing, 2012
2011
2010
Serv. Oriented Comput. Appl., 2010
2009
IEEE Trans. Serv. Comput., 2009
2008
Proceedings of the Fourth IEEE International Symposium on Service-Oriented System Engineering, 2008
A Class of Optimal Frequency Hopping Sequences Based upon the Theory of Power Residues.
Proceedings of the Sequences and Their Applications, 2008
Proceedings of the 2008 IEEE World Congress on Services, 2008
Verifying Behavioral Correctness of Design Pattern Implementation.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008
2007
Proceedings of the First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering, 2007
Architecture and Design Pattern Discovery Techniques - A Review.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007