Author of the publication

Secure Obfuscation of Encrypted Verifiable Encrypted Signatures.

, , and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 188-203. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Matrix-in-matrix Neural Network for Image Super Resolution., , , , and . CoRR, (2019)Error control integration scheme for reliable NoC., , , and . ISCAS, page 3893-3896. IEEE, (2010)Change detection and analysis with radarsat-1 SAR image., , , and . IGARSS, page 2601-2604. IEEE, (2007)Modelling the future variations of Land Use and land cover in the middle reaches of Heihe River, northwestern China., , and . IGARSS, page 883-886. IEEE, (2010)Research of intrusion detection technology based on association rules.. ICDIP, volume 8878 of SPIE Proceedings, page 887839. SPIE, (2013)Research on mobile electronic commerce security technology based on WPKI.. ICDIP, volume 8878 of SPIE Proceedings, page 88780U. SPIE, (2013)Intraday Serial Correlation, Volatility, and Jump: Evidence from China's Stock Market., and . Communications in Statistics - Simulation and Computation, 45 (4): 1226-1239 (2016)Proving Stability of Delta-Sigma Modulator Using Invariant Sets., , and . ISCAS, page 633-636. IEEE, (1995)Detecting bifurcation types in DC-DC switching converters by duplicate symbolic sequence., , , , and . ISCAS, page 2940-2943. IEEE, (2013)Energy finite element analysis of vibrating thin plates at high frequency., , , , and . CIS/RAM, page 255-259. IEEE, (2017)