Author of the publication

Directed proxy signature with fast revocation proven secure in the standard model.

, , , , and . IET Inf. Secur., 11 (3): 168-176 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Surrogate Supervision for Medical Image Analysis: Effective Deep Learning From Limited Quantities of Labeled Data., , , , , , , , and . ISBI, page 1251-1255. IEEE, (2019)Robust Semantic Segmentation with Superpixel-Mix., , , , , , and . BMVC, page 158. BMVA Press, (2021)An FPGA-based morphological filter for baseline wandering correction in photoplethysmography., , , and . BioCAS, page 216-219. IEEE, (2016)Learning Deep Morphological Networks with Neural Architecture Search., , , , and . CoRR, (2021)Directed proxy signature with fast revocation proven secure in the standard model., , , , and . IET Inf. Secur., 11 (3): 168-176 (2017)An Evolutionary Analysis of Hospital Payment System Strategies Based on County Hospitals-Purchasers Game., and . ICMHI, page 200-207. ACM, (2020)Antecedents and Consequences of Information Cocoon Awareness in Short-Form Video APPs: An Information Ecology Perspective., , , , , and . HCI (42), volume 13517 of Lecture Notes in Computer Science, page 115-125. Springer, (2022)Towards Efficient Pairwise Ranking for Service Using Multidimensional Classification., , , and . CollaborateCom, volume 292 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 654-666. Springer, (2019)