Author of the publication

Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.

, , , , , and . Inf. Sci., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique., , , , , and . Inf. Sci., (2015)A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model"., , , and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 335-342. (2016)Research on Distributed Real Time Data Space SCADA Cluster for Large Power Grid., , , , , and . ICSAI, page 161-165. IEEE, (2018)FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair., , , and . CoRR, (2022)Towards a Novel Trust-Based Multicast Routing for VANETs., , , , and . Secur. Commun. Networks, (2018)An Online MFL Sensing Method for Steel Pipe Based on the Magnetic Guiding Effect., , , , , and . Sensors, 17 (12): 2911 (2017)The integration of Building Information Modeling (BIM) and Integrated Project Delivery (IPD) in industrial buildings: Evidence from China., , and . J. Comput. Methods Sci. Eng., 21 (6): 1711-1726 (2021)An Intrusion Detection Scheme Based on Repeated Game in Smart Home., , , , , and . Mob. Inf. Syst., (2020)DC-Biased Magnetization Based Eddy Current Thermography for Subsurface Defect Detection., , , , , and . IEEE Trans. Ind. Informatics, 15 (12): 6252-6259 (2019)Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things., , , , and . IEEE Access, (2020)