Author of the publication

Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication., , , , , and . ICC, page 1-5. IEEE, (2011)Demand analysis and business modeling of community health services performance management., , , , , and . ICNC-FSKD, page 1381-1390. IEEE, (2016)Numerical investigation of a fractional diffusion model on circular comb-inward structure., , and . Appl. Math. Lett., (2020)Space Efficient CMOS Nonlinear Transmission Lines., , and . ISCAS, page 2073-2076. IEEE, (2009)Using Control Theory to Guide Load Shedding in Medical Data Stream Management System., , , , , , , and . ASIAN, volume 3818 of Lecture Notes in Computer Science, page 236-248. Springer, (2005)A Three-Dimensional Ultrasonic Pen-Type Input Device With Millimeter-Level Accuracy for Human-Computer Interaction., , , and . IEEE Access, (2020)Library resources semantization based on resource ontology., , and . Electron. Libr., 32 (3): 341-362 (2014)A Trace-restricted Kronecker-Factored Approximation to Natural Gradient., , , , , , and . CoRR, (2020)A Composite Internal Model Robust Control Strategy for an Automobile Steer-by-wire System., , and . IECON, page 29-34. IEEE, (2020)Learning shape metrics with Monte Carlo optimization., , , and . J. Comput. Appl. Math., (2019)