Author of the publication

Altered Regional Homogeneity and Amplitude of Low-Frequency Fluctuations in Sub-acute Ischemic Stroke: A resting-state fMRI study.

, , , , and . CBS, page 637-640. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes.. ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 417-429. Springer, (2004)New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures., , , and . IEEE Trans. Computers, 54 (12): 1473-1483 (2005)Augmented Oblivious Polynomial Evaluation Protocol and Its Applications., and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 222-230. Springer, (2005)Formal and Precise Analysis of Soundness of Several Shuffling Schemes., and . ProvSec, volume 6402 of Lecture Notes in Computer Science, page 133-143. Springer, (2010)Broadcasting in Star Graphs with Byzantine Failures., , , and . ASIAN, volume 1179 of Lecture Notes in Computer Science, page 162-171. Springer, (1996)Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity., and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 52-61. Springer, (2010)Correction, Optimisation and Secure and Efficient Application of PBD Shuffling., and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 425-437. Springer, (2008)Provably secure public key management protocols for self-organized ad hoc networks., and . PIMRC, page 2691-2695. IEEE, (2005)Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme., , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 171-183. Springer, (2007)An Efficient PIR Construction Using Trusted Hardware., , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 64-79. Springer, (2008)