Author of the publication

Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation.

, , , , and . Quantum Inf. Process., 11 (6): 1359-1369 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Device Fingerprinting Based on Webpage Loading., , , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 127-139. Springer, (2018)Joint Switch Upgrade and VNF Placement for NFV-Based SDNs., , , , and . WASA (2), volume 12385 of Lecture Notes in Computer Science, page 87-95. Springer, (2020)Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs., , , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 432-443. Springer, (2020)Integrating Coflow and Circuit Scheduling for Optical Networks., , , , , and . IEEE Trans. Parallel Distributed Syst., 30 (6): 1346-1358 (2019)Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks., , , , and . IEEE Trans. Parallel Distributed Syst., 26 (4): 1034-1048 (2015)On the Throughput Capacity of Wireless Sensor Networks With Mobile Relays., , , , and . IEEE Trans. Veh. Technol., 61 (4): 1801-1809 (2012)Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks., , , , , and . IEEE Trans. Mob. Comput., 15 (6): 1499-1513 (2016)Breaking A Proxy Signature Scheme From Lattices., and . Int. J. Netw. Secur., 14 (6): 320-323 (2012)Truthful Incentive Mechanism for Nondeterministic Crowdsensing with Vehicles., , , , and . IEEE Trans. Mob. Comput., 17 (12): 2982-2997 (2018)Wireless fire monitoring system for ancient buildings., , , , , , and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 42. ACM, (2007)