Author of the publication

Identity-based Digital Signature Scheme Without Bilinear Pairings.

, , and . IACR Cryptology ePrint Archive, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning non-taxonomical semantic relations from domain texts., and . J. Intell. Inf. Syst., 38 (1): 191-207 (2012)Generalizations of Darbo's fixed point theorem via simulation functions with application to functional integral equations., and . J. Computational Applied Mathematics, (2016)Fabric Database and Fuzzy Logic Models for Evaluating Fabric Performance., , and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)Learning Terrorist Profiles by Optimization with Two Objectives., , , , and . IKE, page 364-369. CSREA Press, (2009)Incremental Integration of Probabilistic Models Learned from Data., , and . ICDM Workshops, page 519-526. IEEE Computer Society, (2007)Efficient photometric feature extraction in a hierarchical learning scheme for nodule detection., , and . IJGCRSIS, 2 (4): 314-326 (2012)Fuzzy clustering and decision tree learning for time-series tidal data classification., , and . FUZZ-IEEE, page 732-737. IEEE, (2003)A spatial data mining method for mineral resources potential assessment., , , and . ICSDM, page 96-99. IEEE, (2011)Non-Embeded Wavelet Image Coding Scheme., , and . ICIP (1), page 584-587. (1997)A pair of nonlinear operators and their applications in predictive image coding., and . Signal Processing, 60 (3): 333-338 (1997)