Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption., , , , and . Comput. J., 56 (10): 1249-1257 (2013)Efficient threshold public key encryption with full security based on dual pairing vector spaces., , , , and . Int. J. Communication Systems, 27 (12): 4059-4077 (2014)Research on 3D Visualization Technology of Electromagnetic Field Based on OSG., , , and . ISCID (1), page 75-78. IEEE, (2017)A Binary Data Stream Scripting Language., and . CoRR, (2015)Efficient Homomorphic Encryption with Key Rotation and Security Update., , , and . IEICE Transactions, 101-A (1): 39-50 (2018)Composite Plate Phased Array Structural Health Monitoring Signal Reconstruction Based on Orthogonal Matching Pursuit Algorithm., , , and . J. Sensors, (2017)A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power., , , , and . INDOCRYPT, volume 4859 of Lecture Notes in Computer Science, page 297-311. Springer, (2007)Image Categorization Based on a Hierarchical Spatial Markov Model., , and . CAIP, volume 5702 of Lecture Notes in Computer Science, page 766-773. Springer, (2009)A niching cumulative genetic algorithm with evaluated probability for multimodal optimization., , , and . GECCO (Companion), page 1073-1076. ACM, (2014)Nonlinear Companding Transform for Reduction of Peak-to-Average Power Ratio in OFDM Systems., , , , and . TBC, 59 (2): 369-375 (2013)