Author of the publication

Exponent-inversion Signatures and IBE under Static Assumptions.

, , , and . IACR Cryptology ePrint Archive, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Secrecy Outage Probability with Symbol Extension., , , and . VTC Spring, page 1-5. IEEE, (2014)Optimization of Masking Expansion Algorithm in Psychoacoustic Models., , and . IPTC, page 161-164. IEEE Computer Society, (2011)Recognizing Human Group Behaviors with Multi-group Causalities., , , and . Web Intelligence/IAT Workshops, page 44-48. IEEE Computer Society, (2012)978-1-4673-6057-9.Secure beamforming and artificial noise design in interference networks with imperfect ECSI., , , , and . ICC Workshops, page 423-428. IEEE, (2015)Design and implementation of three dimensional visualization and analysis system of medical images., , and . BMEI, page 108-112. IEEE, (2012)A binocular vision-based UAVs autonomous aerial refueling platform., , , , , , and . SCIENCE CHINA Information Sciences, 59 (5): 053201:1-053201:7 (2016)A quantitative investigation of the genre development of modern Chinese novels., and . Glottometrics, (2015)SoftPanel: a website for grouping diseases and related disorders for generation of customized panels., , , , , and . BMC Bioinformatics, (2016)Utilizing Massive Viewers for Video Transcoding in Crowdsourced Live Streaming., , and . CLOUD, page 116-123. IEEE, (2016)Flame slice algebraic reconstruction technique reconstruction algorithm based on radial total variation., , , , and . J. Electronic Imaging, 25 (5): 053037 (2016)