Author of the publication

New Algorithms for Secure Outsourcing of Modular Exponentiations.

, , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 541-556. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring the Weibull Scale Parameter Based on Type I Censored Data Using a Modified EWMA Control Chart., , , , , and . Axioms, 12 (5): 487 (May 2023)Performance of the Shiryaev-Roberts-type scheme in comparison to the CUSUM and EWMA schemes in monitoring weibull scale parameter based on Type I censored data., , , , , and . Qual. Reliab. Eng. Int., 38 (7): 3379-3403 (2022)An inductive transfer learning force field (ITLFF) protocol builds protein force fields in seconds., , , , , , and . Briefings Bioinform., (2022)A concept fringe-based concept-cognitive learning method in skill context., , , and . Knowl. Based Syst., (2024)A Quantum Optomechanical Transistor Based on a Cavity-Optomechanical System, , and . (May 29, 2011)Development and Experimentation of PDES-based Analytic Simulation., , , , and . SIGSIM-PADS, page 123-126. ACM, (2016)Different bands of sleep EEG analysis based on the multiscale Jenson-Shannon Divergence., , , , and . CISP-BMEI, page 1-5. IEEE, (2017)Double Adaptive Stochastic Gradient Optimization., , , and . CoRR, (2018)The precise underground localization method based on WIFI network., , , and . APCC, page 664-667. IEEE, (2012)Linear Codes over Galois Ring GR(p2, r) Related to Gauss sums., , and . CoRR, (2016)