Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model., , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 239-253. (2016)Security Analysis of User Efficient Blind Signatures., , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 167-172. Springer, (2004)Improved Privacy-Protecting Proxy Signature Scheme., , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 208-213. Springer, (2004)Efficient keyword search for public-key setting., and . MILCOM, page 1236-1241. IEEE, (2015)Information-Assisted Density Peak Index for Hyperspectral Band Selection., , and . IEEE Geosci. Remote. Sens. Lett., 14 (10): 1870-1874 (2017)The Sizes of Diffuse Ly$\alpha$ Nebulae around Star-Forming Galaxies at High Redshift, , , , , , , , and . (2016)cite arxiv:1611.03510Comment: Resubmitted to ApJ after the referee's comments.A new audio steganalysis method based on linear prediction., , , and . Multimedia Tools Appl., 77 (12): 15431-15455 (2018)Design of a CIL Connector to SPIN., and . COMPSAC, page 349-354. IEEE Computer Society, (2004)Modulation Parameters Recognition Algorithm Based on Expectation Maximization for Continuous Phase Modulation., and . ICEIC, page 1-4. IEEE, (2021)Inner-Product Lossy Trapdoor Functions and Applications., , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 188-205. Springer, (2012)