Author of the publication

Cryptanalysis of an efficient secure group signature scheme.

, , and . ACM SIGOPS Oper. Syst. Rev., 38 (4): 66-69 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic segmentation of corneal deposits from corneal stromal dystrophy images via deep learning., , , , , , , , , and 1 other author(s). Comput. Biol. Medicine, (2021)Alignment of Optical Maps., , , , , , and . RECOMB, volume 3500 of Lecture Notes in Computer Science, page 489-504. Springer, (2005)Topic Modeling for Noisy Short Texts with Multiple Relations., , , and . SEKE, page 610-609. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2018)Social Distance Detection Using Wireless Signal in Social Networks., and . SocialSec, volume 1495 of Communications in Computer and Information Science, page 37-41. Springer, (2021)Advanced manufacturing solution to industry 4.0 trend through sensing network and Cloud Computing technologies., , , , , and . CASE, page 1150-1152. IEEE, (2014)Android malware detection system integrating block feature extraction and multi-head attention mechanism., , , and . ICS, page 408-413. IEEE, (2020)Scheduling of Optimal DASH Streaming., , , , , , , and . ICC 2016, page 43:1-43:9. ACM, (2016)Cryptanalysis of an efficient secure group signature scheme., , and . ACM SIGOPS Oper. Syst. Rev., 38 (4): 66-69 (2004)Exact and easy guidance with visual navigation situation for mobile user., , , , and . ICIMCS, page 105-108. ACM, (2013)Narrative Structure Analysis of Lecture Video with Hierarchical Hidden Markov Model for E-Learning., , , , and . Edutainment, volume 3942 of Lecture Notes in Computer Science, page 429-437. Springer, (2006)