Author of the publication

The generic construction of continuous leakage-resilient identity-based cryptosystems.

, , and . Theor. Comput. Sci., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Fault Scenario Identification for Communication Networks via Knowledge-Enhanced Graph Neural Networks., , , , , , and . IEEE Trans. Mob. Comput., 23 (4): 3243-3258 (April 2024)Passive GNSS-based SAR imaging with sub-apertures combination., , , , and . Signal Image Video Process., 17 (5): 2177-2184 (July 2023)Structure Design and Simulation Test of Water Jet Grassland Root-Cutting Machine., , , , , and . IEEE Access, (2023)IoT-Based Proactive Energy Supply Control for Connected Electric Vehicles., , , , and . IEEE Internet Things J., 6 (5): 7395-7405 (2019)A Lightweight and Robust Multidimensional Data Aggregation Scheme for IoT., , , and . IEEE Internet Things J., 11 (2): 3578-3588 (January 2024)Offloading Optimization in Edge Computing for Deep-Learning-Enabled Target Tracking by Internet of UAVs., , , and . IEEE Internet Things J., 8 (12): 9878-9893 (2021)An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET., , , , , and . IEEE Internet Things J., 10 (24): 22823-22835 (December 2023)Joint Task Offloading and Resource Allocation for Multihop Industrial Internet of Things., , , , and . IEEE Internet Things J., 9 (21): 22022-22033 (2022)Ordered Semiring-based Trust Establish Model with Risk Evaluating., , , and . Int. J. Netw. Secur., 8 (2): 101-106 (2009)Aleakage-resilient certificateless public key encryption scheme with CCA2 security., , , and . Frontiers Inf. Technol. Electron. Eng., 19 (4): 481-493 (2018)