Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Aggregate Signcryption for Vehicular Ad Hoc Networks., , and . ICCSP, page 72-76. ACM, (2018)Universal Designated Verifier Signcryption., , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 126-134. Springer, (2012)The Syncopated Energy Algorithm for Rendering Real-Time Tactile Interactions., and . Frontiers ICT, (2019)Does China's emissions trading system foster corporate green innovation? Evidence from regulating listed companies., , , , and . Technol. Anal. Strateg. Manag., 31 (2): 199-212 (2019)CAKA: a novel cache-aware K-anycast routing scheme for publish/subscribe-based information-centric network., , , , , , and . Int. J. Commun. Syst., 28 (17): 2167-2179 (2015)Seasonal and Diurnal Variations in Cloud-Top Phase over the Western North Pacific during 2017-2019., , , , , and . Remote. Sens., 13 (9): 1687 (2021)A BLS Signature Scheme from Multilinear Maps., and . Int. J. Netw. Secur., 22 (5): 728-735 (2020)Two-Round Witness Hiding Protocol., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (6): 953-960 (2018)Intelligent Bionic Optimization Algorithm Based on the Growth Characteristics of Tree Branches.. Int. J. Cogn. Informatics Nat. Intell., 15 (2): 34-46 (2021)Construction of applied talents training system based on machine learning under the background of new liberal arts.. PeerJ Comput. Sci., (2023)