Author of the publication

ExBLACR: Extending BLACR System.

, , , , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 397-412. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis on AW digital signature scheme based on error-correcting codes., , and . Science in China Series F: Information Sciences, 45 (5): 397-400 (2002)Black-box testing based on colorful taint analysis., , , and . SCIENCE CHINA Information Sciences, 55 (1): 171-183 (2012)Generic Constructions for Strong Designated Verifier Signature., , and . JIPS, 7 (1): 159-172 (2011)On the provable security of TPM2.0 cryptography APIs., and . IJES, 7 (3/4): 230-243 (2015)DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory., , and . Journal of Computer Research and Development, 43 (11): 1920-1926 (2006)Distributed Oblivious Function Evaluation and Its Applications., , , and . J. Comput. Sci. Technol., 19 (6): 942-947 (2004)Study on Strand Space Model Theory., , , and . J. Comput. Sci. Technol., 18 (5): 553-570 (2003)Computing Walsh coefficients from the algebraic normal form of a Boolean function., , , and . Cryptography and Communications, 6 (4): 335-358 (2014)Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication., , and . IEEE Communications Letters, 9 (4): 372-374 (2005)A secure and efficient revocation scheme for fine-grained access control in cloud storage., , , and . CloudCom, page 545-550. IEEE Computer Society, (2012)