Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments., , , , and . MobiQuitous (Adjunct Proceedings), page 88-93. ACM, (2016)Active One-Time Password Mechanism for User Authentication., , , and . GPC, volume 7861 of Lecture Notes in Computer Science, page 464-471. Springer, (2013)Randomization enhanced Chaum's blind signature scheme., , and . Comput. Commun., 23 (17): 1677-1680 (2000)Risk of Bitcoin Addresses to be Identified from Features of Output Addresses., , and . DSC, page 1-6. IEEE, (2018)Buyer-seller watermarking protocols with off-line trusted third parties., , and . Int. J. Ad Hoc Ubiquitous Comput., 4 (1): 36-43 (2009)WeisoEvent: A Ming-Weiso Event Analytics Tool with Named Entity Markup and Spatial-Temporal Information Linking., , , , , and . DH, Alliance of Digital Humanities Organizations (ADHO), (2017)Automatic Labeled Data Generation for Person Named Entity Disambiguation on the Ming Shilu., , , and . DH, (2020)Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map., , and . AsiaJCIS, page 9-15. IEEE, (2020)Comments on Hwang-Lee-Lai Attack upon Fan-Lei Partially Blind Signature Scheme.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (7): 1900-1901 (2003)Robust remote authentication scheme with smart cards., , and . Comput. Secur., 24 (8): 619-628 (2005)