Author of the publication

Deleting Secret Data with Public Verifiability.

, , and . IEEE Trans. Dependable Sec. Comput., 13 (6): 617-629 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography., , , and . IEEE MultiMedia, 25 (4): 46-56 (2018)A Dual-Side-Detuned Series-Series Compensated Resonant Converter for Wide Charging Region in a Wireless Power Transfer System., , , , , and . IEEE Trans. Industrial Electronics, 65 (3): 2177-2188 (2018)PriVeto: a fully private two-round veto protocol., , and . IET Information Security, 13 (4): 311-320 (2019)The application of DBF neural networks for object recognition., , and . Inf. Sci., 160 (1-4): 153-160 (2004)Optimal Caching Placement for D2D Assisted Wireless Caching Networks., , , , and . CoRR, (2015)Texture segmentation for remote sensing image based on texture-topic model., , and . IGARSS, page 2669-2672. IEEE, (2011)Statistical Test Based on Finding the Optimum Lag in Cyclic Autocorrelation for Detecting Free Bands in Cognitive Radios., , and . CrownCom, page 1-6. IEEE, (2008)SIFT-based Elastic sparse coding for image retrieval., , , and . ICIP, page 2437-2440. IEEE, (2012)A tractable model for Device-to-Device communication underlaying multi-cell cellular networks., , , and . ICC Workshops, page 587-591. IEEE, (2014)E2E Verifiable Borda Count Voting System without Tallying Authorities., , and . ARES, page 11:1-11:9. ACM, (2019)