Author of the publication

New Identity-based Key-exposure Free Chameleon Hash from Bilinear Pairings.

, , and . JNW, 9 (7): 1756-1763 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pressure-drop studies of resistance components for integration into a SFM-based fluidic circuit., , , and . CASE, page 896-899. IEEE, (2012)The Impact of Organizational Learning on Lack of Team's Expertise Risk in Information Systems Projects., and . ICEBE, page 738-743. IEEE Computer Society, (2007)Quantum private comparison with a malicious third party., , , , and . Quantum Information Processing, 14 (6): 2125-2133 (2015)On the impossibility of non-static quantum bit commitment between two parties., , , , and . Quantum Information Processing, 11 (2): 519-527 (2012)On the impossibility of non-static quantum bit commitment between two parties, , , , and . CoRR, (2011)Using two-phase evolutionary computation approach for nonlinear constrained signal detectors allocation problems., , , and . Journal of Intelligent and Fuzzy Systems, 36 (2): 1301-1310 (2019)New Identity-based Key-exposure Free Chameleon Hash from Bilinear Pairings., , and . JNW, 9 (7): 1756-1763 (2014)A hybrid rule mining approach for cardiovascular disease detection in traditional Chinese medicine., , , and . Journal of Intelligent and Fuzzy Systems, 36 (2): 861-870 (2019)Efficient ID-based Non-Malleable Trapdoor Commitments Based on RSA and Factoring., , and . JCM, 10 (5): 330-338 (2015)Improving project performance through organisational learning: an empirical study in Taiwan., and . Techn. Analysis & Strat. Manag., 22 (2): 261-276 (2010)