Author of the publication

Password-Controlled Encryption with Accountable Break-Glass Access.

, , and . AsiaCCS, page 235-246. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison study on flow fields in vortex flow sensors with circular cylinder and trapezoidal cylinder bluff bodies., and . ICMLC, page 1376-1380. IEEE, (2011)Chinese ner hybrid pattern based on multi-feature fusion., , , and . ICMLC, page 5-9. IEEE, (2011)An improved connectivity-based boundary detection algorithm in wireless sensor networks., , and . LCN, page 332-335. IEEE Computer Society, (2013)Interactive Graph Cut Based Segmentation with Shape Priors., and . CVPR (1), page 755-762. IEEE Computer Society, (2005)Mobile Service Discovery Protocol (MSDP) for Mobile Ad-Hoc Networks., , and . ISADS, page 352-362. IEEE Computer Society, (2007)Research on Time Dependent Vehicle Routing Problem with Simultaneous Delivery and Pickup., , , and . ICNC (3), page 66-70. IEEE Computer Society, (2009)Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks., , and . IEEE Internet of Things Journal, 3 (3): 408-417 (2016)Compact inline dual-band dual-mode BPF with a hybrid structure of single-layered SIW and CPW., , , , and . IEICE Electronic Express, 13 (10): 20160209 (2016)The extraction of characteristic quantity of shallow defects in pulsed magnetic flux leakage signal., , , , and . ICAC, page 225-229. IEEE, (2011)A fully integrated video digital-to-analog converter with minimized gain error., and . ISCAS, page 837-840. IEEE, (2013)