Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Aggregate Signcryption for Vehicular Ad Hoc Networks., , and . ICCSP, page 72-76. ACM, (2018)Universal Designated Verifier Signcryption., , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 126-134. Springer, (2012)Two-Round Witness Hiding Protocol., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (6): 953-960 (2018)The Syncopated Energy Algorithm for Rendering Real-Time Tactile Interactions., and . Frontiers ICT, (2019)Does China's emissions trading system foster corporate green innovation? Evidence from regulating listed companies., , , , and . Technol. Anal. Strateg. Manag., 31 (2): 199-212 (2019)Intelligent Bionic Optimization Algorithm Based on the Growth Characteristics of Tree Branches.. Int. J. Cogn. Informatics Nat. Intell., 15 (2): 34-46 (2021)A BLS Signature Scheme from Multilinear Maps., and . Int. J. Netw. Secur., 22 (5): 728-735 (2020)CAKA: a novel cache-aware K-anycast routing scheme for publish/subscribe-based information-centric network., , , , , , and . Int. J. Commun. Syst., 28 (17): 2167-2179 (2015)Seasonal and Diurnal Variations in Cloud-Top Phase over the Western North Pacific during 2017-2019., , , , , and . Remote. Sens., 13 (9): 1687 (2021)AIBench: An Agile Domain-specific Benchmarking Methodology and an AI Benchmark Suite., , , , , , , , , and 24 other author(s). CoRR, (2020)