Author of the publication

Are you The One to Share? Secret Transfer with Access Structure.

, and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application in Radar Simulation of STK/Connect Module., , , and . CSIE (3), page 274-276. IEEE Computer Society, (2009)A New Evidence Combination Scheme for Decision Assistant., , and . CyberC, page 53-57. IEEE Computer Society, (2012)Robust Adaptive Wideband Beamforming Against Direction and Sensor Location Errors., , , and . CSSP, 38 (2): 664-681 (2019)A Novel Time Delay Estimation Interpolation Algorithm Based on Second-Order Cone Programming., , , and . IEICE Transactions, 99-B (6): 1311-1317 (2016)Are you The One to Share? Secret Transfer with Access Structure., and . IACR Cryptology ePrint Archive, (2015)Assembling the 20 Gb white spruce (Picea glauca) genome from whole-genome shotgun sequencing data., , , , , , , , , and 14 other author(s). Bioinformatics, 29 (12): 1492-1497 (2013)Robust Adaptive Wideband Beamforming Based on Time Frequency Distribution., , , and . IEEE Trans. Signal Processing, 67 (16): 4370-4382 (2019)Refining Inaccurate Transmitter and Receiver Positions Using Calibration Targets for Target Localization in Multi-Static Passive Radar., , , , and . Sensors, 19 (15): 3365 (2019)A Bias Compensation Method for Distributed Moving Source Localization Using TDOA and FDOA with Sensor Location Errors., , and . Sensors, 18 (11): 3747 (2018)Privacy-Preserving Decision Trees Evaluation via Linear Functions., , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 494-512. Springer, (2017)