Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Simultaneous Integer Relations for Several Real Vectors, , , and . CoRR, (2010)A complete algorithm to find exact minimal polynomial by approximations, , , and . CoRR, (2010)Detecting Simultaneous Integer Relation for Real Vectors and Finding the Minimal Polynomial of an Algebraic Number, , and . CoRR, (2009)Query Integrity Meets Blockchain: A Privacy-Preserving Verification Framework for Outsourced Encrypted Data., , , , , and . IEEE Trans. Serv. Comput., 16 (3): 2100-2113 (May 2023)PACM: Privacy-Preserving Authentication Scheme With on-Chain Certificate Management for VANETs., , , , , and . IEEE Trans. Netw. Serv. Manag., 20 (1): 216-228 (March 2023)Extended Polar Format Algorithm for Large-Scene High-Resolution WAS-SAR Imaging., , , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2021)External Memory Bidirectional Search., and . IJCAI, page 676-682. IJCAI/AAAI Press, (2016)Parallel computation of real solving bivariate polynomial systems by zero-matching method, , , and . CoRR, (2010)Homomorphically Encrypted Arithmetic Operations over the Integer Ring., , , and . IACR Cryptology ePrint Archive, (2017)Sparse Non-negative Matrix Factorization with Generalized Kullback-Leibler Divergence., , , , and . IDEAL, volume 9937 of Lecture Notes in Computer Science, page 353-360. Springer, (2016)