Author of the publication

CCA-Secure Deterministic Identity-Based Encryption Scheme.

, , , , , and . J. Univers. Comput. Sci., 25 (3): 245-269 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control Performance Aware Cooperative Transmission in Multiloop Wireless Control Systems for Industrial IoT Applications., , , , , and . IEEE Internet of Things Journal, 5 (5): 3954-3966 (2018)Integrated Independent Geometric Calibration of Stereo Cameras Aboard an Optical Satellite., , , and . IGARSS, page 8489-8492. IEEE, (2019)Characterizing and Discovering Spatiotemporal Social Contact Patterns for Healthcare., , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 39 (8): 1532-1546 (2017)When Deep Meets Shallow: Subspace-Based Multi-View Fusion for Instance-Level Image Retrieval., , , , and . ROBIO, page 486-492. IEEE, (2018)Research on Data Sharing Analysis and Key Technology of Smart City., , , , , and . Geoinformatics, page 1-7. IEEE, (2018)The coupling error analysis of the decoupled silicon Micro-Gyroscope., , , , , and . NEMS, page 356-361. IEEE, (2010)Learning Deep Features for Classification of Typical Ecological Environmental Elements in High-Resolution Remote Sensing Images., , , and . ISCID (1), page 223-227. IEEE, (2017)Global stability with time delay in optimization flow control., , , , and . ICARCV, page 585-589. IEEE, (2004)Cross-layer scheduling with secrecy demands in delay-aware OFDMA network., , and . WCNC, page 1339-1344. IEEE, (2013)Image Reconstruction by Orthogonal Moments Derived by the Parity of Polynomials., , and . ICASSP, page 1672-1676. IEEE, (2019)