Author of the publication

How to Construct Interval Encryption from Binary Tree Encryption.

, , , , , and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 19-34. (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs., , , and . IEEE Trans. Intell. Transp. Syst., 13 (1): 127-139 (2012)HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks., , , , and . Comput. Commun., 35 (15): 1910-1920 (2012)A multiresolution object space point-based rendering approach for mobile devices., and . Afrigraph, page 7-13. ACM, (2007)Flexible editing of style, identity and content of human motion., , , and . SI3D, page 202. ACM, (2011)The augmented reality research progress in collaboration environment of CAR-CA., , , , and . VRCAI, page 229-236. ACM, (2010)Light Space Cascaded Shadow Maps for Large Scale Dynamic Environments., , , and . MIG, volume 5884 of Lecture Notes in Computer Science, page 243-255. Springer, (2009)Single Depth Map Super-resolution with Local Self-similarity., , and . ICVIP, page 198-202. ACM, (2018)HyperSDFusion: Bridging Hierarchical Structures in Language and Geometry for Enhanced 3D Text2Shape Generation., , , and . CoRR, (2024)MAGR: Manifold-Aligned Graph Regularization for Continual Action Quality Assessment., , , , , , and . CoRR, (2024)Exploiting Relevance of Speech to Sleepiness Detection via Attention Mechanism., , , and . ICC, page 5527-5532. IEEE, (2023)