Author of the publication

A Secure Document Self-Destruction Scheme with Identity Based Encryption.

, , , , and . INCoS, page 239-243. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic reading system based on automatic alignment control for pointer meter., , , , and . IECON, page 3414-3418. IEEE, (2014)Novel linear search for support vector machine parameter selection., , , , , and . Journal of Zhejiang University - Science C, 12 (11): 885-896 (2011)IDR/QR: An Incremental Dimension Reduction Algorithm via QR Decomposition., , , , , and . IEEE Trans. Knowl. Data Eng., 17 (9): 1208-1222 (2005)Efficient execution of speculative threads and transactions with hardware transactional memory., , , , and . Future Generation Comp. Syst., (2014)Toward a practical approach for BGP stability with root cause check., , , , and . J. Parallel Distrib. Comput., 71 (8): 1098-1110 (2011)Safe and Practical Energy-Efficient Detour Routing in IP Networks., , , , , and . IEEE/ACM Trans. Netw., 22 (6): 1925-1937 (2014)Priority-based squash reducing methods in thread level speculation., , , , , , , and . IJITCC, 2 (2): 138-154 (2012)Design and performance of spinal codes over fading channels., , , and . HMWC, page 140-145. IEEE, (2014)Improving discriminant neural network (DNN) design by the use of principal component analysis., and . ICASSP, page 3375-3378. IEEE Computer Society, (1995)A new algorithm for fast discriminative training., and . ICASSP, page 97-100. IEEE, (2002)