Author of the publication

Reliable H∞ filtering for discrete piecewise linear systems with infinite distributed delays.

, , , and . Int. J. General Systems, 43 (3-4): 346-358 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues., , , , and . I. J. Network Security, 14 (1): 33-38 (2012)New designing of cryptosystems based on quadratic fields., , and . Science in China Series F: Information Sciences, 51 (8): 1106-1116 (2008)Discrete logarithm based additively homomorphic encryption and secure data aggregation., , , , and . Inf. Sci., 181 (16): 3308-3322 (2011)Certificate-based proxy decryption systems with revocability in the standard model., , , , , and . Inf. Sci., (2013)CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model., , , and . JSW, 8 (5): 1245-1253 (2013)Biased Bit Commitment and Applications., , , , and . J. Inf. Sci. Eng., 24 (2): 441-452 (2008)Simulation of Key Management Protocol in Wireless Sensor Networks., , , and . CSO (2), page 333-335. IEEE Computer Society, (2009)978-0-7695-3605-7.: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks., , , , and . IEEE Trans. Vehicular Technology, 60 (2): 580-591 (2011)Quantifying team precedence in the game of cricket., , , , , and . Cluster Computing, 21 (1): 523-537 (2018)Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks., , , , and . IJDSN, (2013)