Author of the publication

Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.

, , , , and . IJDSN, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Monopulse Angle Estimation Method for Wideband LFM Radars., , , , and . Sensors, 16 (6): 817 (2016)Detection in sea clutter based on nonlinear ARCH model., , , and . Digit. Signal Process., (2016)Frequency-Domain Range Sidelobe Correction in Stretch Processing for Wideband LFM Radars., , , , and . IEEE Trans. Aerosp. Electron. Syst., 53 (1): 111-121 (2017)Parameter estimation of polynomial phase signal based on low-complexity LSU-EKF algorithm in entire identifiable region., , , , and . ICASSP, page 4786-4790. IEEE, (2016)Range, radial velocity, and acceleration MLE using frequency modulation coded LFM pulse train., , , , and . Digit. Signal Process., (2017)Processing overhead studies in resource reservation protocols, and . Teletraffic Engineering in the Internet EraProceedings of the International Teletraffic Congress - ITC-I7, volume 4 of Teletraffic Science and Engineering, Elsevier, (2001)YESSIR: a simple reservation mechanism for the Internet., and . Comput. Commun. Rev., 29 (2): 89-101 (1999)Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption., , , , and . Comput. J., 56 (10): 1249-1257 (2013)Efficient threshold public key encryption with full security based on dual pairing vector spaces., , , , and . Int. J. Commun. Syst., 27 (12): 4059-4077 (2014)RSVP Refresh Overhead Reduction Extensions., , , , , and . RFC, (April 2001)