Author of the publication

Efficient Secure Multiparty Computation Protocol in Asynchronous Network.

, , , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 152-158. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A key management protocol with robust continuity for sensor networks., , , , and . Computer Standards & Interfaces, 31 (4): 642-647 (2009)GPU-Based High Performance Password Recovery Technique for Hash Functions., , , , , and . J. Inf. Sci. Eng., 32 (1): 97-112 (2016)SHUM-uCOS: A RTOS using multi-task model to reduce migration cost between SW/HW tasks., , , and . CSCWD (2), page 984-989. IEEE Computer Society, (2005)1-84600-002-5.Biclique cryptanalysis using balanced complete bipartite subgraphs., , , , and . SCIENCE CHINA Information Sciences, 59 (4): 049101:1-049101:3 (2016)Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service., , , , and . Complexity, (2017)On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs., , , and . ISPEC, volume 6672 of Lecture Notes in Computer Science, page 247-256. Springer, (2011)Mining Co-locations from Continuously Distributed Uncertain Spatial Data., , , , and . APWeb (1), volume 9931 of Lecture Notes in Computer Science, page 66-78. Springer, (2016)Wacnet: Word Segmentation Guided Characters Aggregation Net for Scene Text Spotting With Arbitrary Shapes., , , , , and . ICIP, page 3382-3386. IEEE, (2019)Restrictive partially blind signature for resource-constrained information systems., , , , and . Knowl. Inf. Syst., 26 (1): 87-103 (2011)Component Priority Assignment in tha Data Flow Dominated Embedded Systems with Timing Constraints., , , and . CSCWD, page 385-388. IEEE, (2002)