Follow
Solomon SARPONG(Dr)
Solomon SARPONG(Dr)
University of Environment and Sustainable Development, Somanya, Ghana
Verified email at uesd.edu.gh
Title
Cited by
Cited by
Year
Private blockchain-based secure access control for smart home systems
J Xue, C Xu, Y Zhang
KSII Transactions on Internet and Information Systems (TIIS) 12 (12), 6057-6078, 2018
742018
Spatio-temporal trend analysis of rainfall and temperature extremes in the Vea Catchment, Ghana
I Larbi, FCC Hountondji, T Annor, WA Agyare, J Mwangi Gathenya, ...
Climate 6 (4), 87, 2018
672018
The Hippo pathway regulates caveolae expression and mediates flow response via caveolae
V Rausch, JR Bostrom, J Park, IR Bravo, Y Feng, DC Hay, BA Link, ...
Current Biology 29 (2), 242-255. e6, 2019
622019
Chemical Modulation of in Vivo Macrophage Function with Subpopulation-Specific Fluorescent Prodrug Conjugates
A Fernandez, M Vermeren, D Humphries, R Subiros-Funosas, N Barth, ...
ACS Central Science 3 (9), 995-1005, 2017
622017
Identity-based public verification with privacy-preserving for data storage security in cloud computing
J Zhao, C Xu, F Li, W Zhang
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
602013
Cryptographic public verification of data integrity for cloud storage systems
Y Zhang, C Xu, H Li, X Liang
IEEE Cloud Computing 3 (5), 44-52, 2016
582016
A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety
C Jin, C Xu, X Zhang, F Li
Journal of medical systems 40, 1-6, 2016
582016
Secure outsourcing SIFT: Efficient and privacy-preserving image feature extraction in the encrypted domain
L Jiang, C Xu, X Wang, B Luo, H Wang
IEEE Transactions on Dependable and Secure Computing 17 (1), 179-193, 2017
572017
Wound healing in zebrafish
P Martin, Y Feng
Nature 459 (7249), 921-923, 2009
552009
Designated verifier proxy signature scheme without random oracles
Y Yu, C Xu, X Zhang, Y Liao
Computers & Mathematics with Applications 57 (8), 1352-1364, 2009
552009
Pivotal role of hmx2 and hmx3 in zebrafish inner ear and lateral line development
Y Feng, Q Xu
Developmental biology 339 (2), 507-518, 2010
542010
Secure password-protected encryption key for deduplicated cloud storage systems
Y Zhang, C Xu, N Cheng, X Shen
IEEE Transactions on Dependable and Secure Computing 19 (4), 2789-2806, 2021
532021
Detecting Changes in Hydro-Climatic Variables during the Last Four Decades (1975-2014) on Downstream Kaduna River Catchment, Nigeria
C Okafor, OD Jimoh, I Larbi
Atmosphere and Climate Science, 2017
532017
An efficient anonymous proxy signature scheme with provable security
Y Yu, C Xu, X Huang, Y Mu
Computer Standards & Interfaces 31 (2), 348-353, 2009
532009
A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography
C Jin, C Xu, X Zhang, J Zhao
Journal of medical systems 39, 1-8, 2015
522015
Commodity options purchasing and credit financing under capital constraint
Y Feng, Y Mu, B Hu, A Kumar
International Journal of Production Economics 153, 230-237, 2014
512014
Prevalence of psychiatric diagnosis and related psychopathological symptoms among patients with COVID-19 during the second wave of the pandemic
Z Zhang, Y Feng, R Song, D Yang, X Duan
Globalization and health 17, 1-12, 2021
502021
Imaging innate immune responses at tumour initiation: new insights from fish and flies
Y Feng, P Martin
Nature Reviews Cancer 15 (9), 556-562, 2015
502015
Coronin-1C and RCC2 guide mesenchymal migration by trafficking Rac1 and controlling GEF exposure
RC Williamson, CAM Cowell, CL Hammond, DJM Bergen, JA Roper, ...
Journal of cell science 127 (19), 4292-4307, 2014
492014
Proteolytic and opportunistic breaching of the basement membrane zone by immune cells during tumor initiation
MCW van den Berg, L MacCarthy-Morrogh, D Carter, J Morris, IR Bravo, ...
Cell reports 27 (10), 2837-2846. e4, 2019
472019
The system can't perform the operation now. Try again later.
Articles 1–20