Author of the publication

Anonymous identity-based broadcast encryption technology for smart city information system.

, , , and . Pers. Ubiquitous Comput., 21 (5): 841-853 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Heuristic Monte Carlo Algorithm for Unmanned Ground Vehicles Realtime Localization and Mapping., , , , , and . IEEE Trans. Veh. Technol., 69 (10): 10642-10655 (2020)Double JPEG compression detection based on block statistics., , , , and . Multim. Tools Appl., 77 (24): 31895-31910 (2018)Fully secure fuzzy identity-based encryption for secure IoT communications., , , , , and . Comput. Stand. Interfaces, (2016)On the robustness of JPEG post-compression to resampling factor estimation., , , , , and . Signal Process., (2020)Infectious Disease Prediction and Analysis Based on Parametric-nonparametric Hybrid Model., , , , , and . ICAIIS, page 289:1-289:6. ACM, (2021)Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense., , , , and . Intell. Autom. Soft Comput., 22 (3): 397-403 (2016)A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality., , , , , , and . IEEE Access, (2019)An improved recommendation based on graph convolutional network., , , and . J. Intell. Inf. Syst., 59 (3): 801-823 (2022)Research on the Laws of Multimodal Perception and Cognition from a Cross-cultural Perspective - Taking Overseas Chinese Gardens as an Example., , , , , and . CoRR, (2023)Regularized Adversarial Training (RAT) for Robust Cellular Electron Cryo Tomograms Classification., , , , , , and . BIBM, page 1-6. IEEE, (2019)