Author of the publication

On Enabling Attribute-Based Encryption to Be Traceable Against Traitors.

, , and . Comput. J., 64 (4): 575-598 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prolonged Mobile Phone Use Is Associated with Poor Academic Performance in Adolescents., , , , , and . Cyberpsychology Behav. Soc. Netw., 23 (5): 303-311 (2020)Analysis of performance impact of drill-down techniques for web traffic models, , , , and . (2003)Bandwidth-Sharing schemes for multiple multi-party sessions, , , , and . (2003)Simulation of shallow water depth data merging for HJ-1A/HSI and EO-1/Hyperion., , and . IGARSS, page 2957-2960. IEEE, (2014)CS-based moving target detection in random PRI radar., , and . IGARSS, page 7476-7479. IEEE, (2012)Fault Modeling on Complex Plane and Tolerance Handling Methods for Analog Circuits., , , , and . IEEE Trans. Instrumentation and Measurement, 62 (10): 2730-2738 (2013)Reflectance model of plastic substrate halftone image based on Markov chain., , , , and . Color Imaging: Displaying, Processing, Hardcopy, and Applications, volume 7866 of SPIE Proceedings, page 78661M. SPIE, (2011)Load shedding and distributed resource control of stream processing networks., , , and . Perform. Evaluation, 64 (9-12): 1102-1120 (2007)Application of Digital Technologies in Teaching Chinese Garden and Architecture., , , , and . TALE, page 1-7. IEEE, (2019)Adaptive Iterative Turbo Decoding Algorithm., , , and . VTC Spring, page 1472-1476. IEEE, (2006)