Author of the publication

Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups.

, , , , , and . Fundam. Informaticae, 126 (1): 103-119 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Congestion Prediction for Urban Areas by Spatiotemporal Data Mining., and . CyberC, page 290-297. IEEE, (2017)The Keyword Extraction of Chinese Medical Web Page Based on WF-TF-IDF Algorithm., , and . CyberC, page 193-198. IEEE, (2017)Securing Named Data Networking: Attribute-Based Encryption and Beyond., , , , , and . IEEE Commun. Mag., 56 (11): 76-81 (2018)An Optimization Strategy for Weighted Extreme Learning Machine based on PSO., , , , , , and . Int. J. Pattern Recognit. Artif. Intell., 31 (1): 1751001:1-1751001:16 (2017)An Improved H-Algorand Consensus Mechanism With Credibility Assessment Applying in EMR Storage System., , , , , and . IEEE Access, (2022)eFL-Boost: Efficient Federated Learning for Gradient Boosting Decision Trees., , and . IEEE Access, (2022)Understanding the Interplay Between Government Microblogs and Citizen Engagement: Evidence from China., and . Electron. Commer. Res., 21 (2): 487-520 (2021)Detailed Processes of Tidal Flat Geomorphology Evolution Based on Time-Series Satellite Images., , , , , and . Remote. Sens., 14 (17): 4341 (2022)POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity., , , , , and . ACM Conference on Computer and Communications Security, page 1684-1686. ACM, (2015)A Secure Automobile Information Sharing System., , and . IoTPTS@AsiaCCS, page 19-26. ACM, (2015)