Author of the publication

Analysis and Improvement of an ID-Based Anonymous Signcryption Model.

, , , and . ICIC (1), volume 5754 of Lecture Notes in Computer Science, page 433-442. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid flexible neural-tree-based intrusion detection systems., , and . Int. J. Intell. Syst., 22 (4): 337-352 (2007)High speed architectures for Leviathan: a binary tree based stream cipher., , , and . Microprocessors and Microsystems, 28 (10): 573-584 (2004)Research on congestible government production and welfare expenditure in stochastic endogenous growth model., , and . IJCAT, 50 (1/2): 148-157 (2014)Flexible neural trees ensemble for stock index modeling., , and . Neurocomputing, 70 (4-6): 697-703 (2007)Feature selection and classification using flexible neural tree., , and . Neurocomputing, 70 (1-3): 305-313 (2006)Accelerating FCM neural network classifier using graphics processing units with CUDA., , , , and . Appl. Intell., 40 (1): 143-153 (2014)SymMatch: Secure and privacy-preserving symptom matching for mobile healthcare social networks., , , and . WCSP, page 1-6. IEEE, (2013)A retargeting methodology of nano-watt CMOS reference circuit based on advanced compact MOSFET model., , , , and . ISCAS, page 938-941. IEEE, (2012)A Particle Filtering for 3D Human Hand Tracking., , , , , and . ICYCS, page 1279-1284. IEEE Computer Society, (2008)Temporarily static object detection in surveillance video using double foregrounds and superpixels., , , and . VCIP, page 446-449. IEEE, (2014)