Author of the publication

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature.

, , , and . IACR Cryptology ePrint Archive, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous authentication for circuits from correlation-relaxed two-to-one recoding., , , , and . J. Ambient Intelligence and Humanized Computing, 7 (2): 153-161 (2016)A new partial splitting augmented Lagrangian method for minimizing the sum of three convex functions., , and . Applied Mathematics and Computation, 219 (10): 5449-5457 (2013)A Parallel Splitting Method for Separable Convex Programs., , and . J. Optimization Theory and Applications, 159 (1): 138-158 (2013)An improved first-order primal-dual algorithm with a new correction step., , and . J. Global Optimization, 57 (4): 1419-1428 (2013)A Novel Power Ramping Scheme of M2M for WCDMA Random Access Channel., , , , and . VTC Fall, page 1-5. IEEE, (2012)The Effect of Background Music-Induced Arousal on Online Consumer Search Behavior: Evaluating Search Performance and Experience., , and . AMCIS, page 260. Association for Information Systems, (2008)Toward Understanding the Capability Cycle of Software Process Improvement: A Case Study of a Software Service Company., , and . Information Technology in the Service Economy, volume 267 of IFIP Advances in Information and Communication Technology, page 379-381. Springer, (2008)Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things., , , , , and . J. Network and Computer Applications, (2019)Attacks and Comments on Several Recently Proposed Key Management Schemes., , and . IACR Cryptology ePrint Archive, (2013)Bidirectional Analysis Method of Static XSS Defect Detection Technique Based On Database Query Language., , , and . Trans. Computational Collective Intelligence, (2015)