Author of the publication

Forgeability Attack of Two Special Signature Schemes.

, , and . ICIC (1), volume 6838 of Lecture Notes in Computer Science, page 494-501. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An intensity ratio of interlocking loops determines circadian period length., , , , , , , , , and . Nucleic acids research, 42 (16): 10278--10287 (Dec 1, 2014)Functional connectivity and activity of white matter in somatosensory pathways under tactile stimulations., , , , , , and . NeuroImage, (2017)Utilizing Multilevel Features for Cloud Detection on Satellite Imagery., and . Remote Sensing, 10 (11): 1853 (2018)Differentially Private Stochastic Gradient Descent for in-RDBMS Analytics., , , , and . CoRR, (2016)Hyperspectral Image Classification Based on Deep Forest and Spectral-Spatial Cooperative Feature., , , , , and . ICIG (3), volume 10668 of Lecture Notes in Computer Science, page 325-336. Springer, (2017)A multi-point local search algorithm for continuous dynamic optimization., and . CEC, page 2736-2743. IEEE, (2016)Performance Analysis of SCMA System Based on Polar Codes., and . GLOBECOM Workshops, page 1-5. IEEE, (2018)Gait measurement and quantitative analysis in patients with Parkinson's disease for rehabilitation assessment., , , , , and . ROBIO, page 286-291. IEEE, (2013)Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences., , , , and . CoRR, (2015)Quantum Hall Conductivity in the Presence of Interactions., and . Symmetry, 12 (2): 200 (2020)