Author of the publication

Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.

, , , , and . IJDSN, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parameter estimation of polynomial phase signal based on low-complexity LSU-EKF algorithm in entire identifiable region., , , , and . ICASSP, page 4786-4790. IEEE, (2016)Frequency-Domain Range Sidelobe Correction in Stretch Processing for Wideband LFM Radars., , , , and . IEEE Trans. Aerospace and Electronic Systems, 53 (1): 111-121 (2017)A Novel Monopulse Angle Estimation Method for Wideband LFM Radars., , , , and . Sensors, 16 (6): 817 (2016)Range, radial velocity, and acceleration MLE using frequency modulation coded LFM pulse train., , , , and . Digital Signal Processing, (2017)Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption., , , , and . Comput. J., 56 (10): 1249-1257 (2013)Efficient threshold public key encryption with full security based on dual pairing vector spaces., , , , and . Int. J. Communication Systems, 27 (12): 4059-4077 (2014)Faculty Training of Computer Hardware Courses Based on University-enterprise Cooperation., , , and . HPCC-ICESS, page 1668-1672. IEEE Computer Society, (2012)YESSIR: a simple reservation mechanism for the Internet., and . Computer Communication Review, 29 (2): 89-101 (1999)RSVP Refresh Overhead Reduction Extensions., , , , , and . RFC, (April 2001)Open transport switch: a software defined networking architecture for transport networks., , , , , , and . HotSDN, page 115-120. ACM, (2013)