Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Full Security: Fuzzy Identity Based Encryption., and . IACR Cryptology ePrint Archive, (2008)Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM., , , , and . IACR Cryptology ePrint Archive, (2008)Exploring the design space of multiple video interaction., , , and . NordiCHI, page 276-285. ACM, (2014)Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM., , , , and . CIS (1), page 326-330. IEEE Computer Society, (2008)Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols., , , , and . IACR Cryptology ePrint Archive, (2008)Local outlier detection based on information entropy weighting., , , and . IJSNet, 30 (4): 207-217 (2019)A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing., , , , and . IEEE Access, (2019)A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine., , , , , and . Inf. Sci., (2020)A new user behavior evaluation method in online social network., , , and . J. Inf. Secur. Appl., (2019)Secure Key Distribution for the Smart Grid., and . IEEE Trans. Smart Grid, 3 (3): 1437-1443 (2012)