Author of the publication

On Enabling Attribute-Based Encryption to Be Traceable Against Traitors.

, , and . Comput. J., 64 (4): 575-598 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prolonged Mobile Phone Use Is Associated with Poor Academic Performance in Adolescents., , , , , and . Cyberpsychology Behav. Soc. Netw., 23 (5): 303-311 (2020)Simulation of shallow water depth data merging for HJ-1A/HSI and EO-1/Hyperion., , and . IGARSS, page 2957-2960. IEEE, (2014)Analysis of performance impact of drill-down techniques for web traffic models, , , , and . (2003)Bandwidth-Sharing schemes for multiple multi-party sessions, , , , and . (2003)DAS, Uncoordinated Femto and Joint Scheduling Systems for In-Building Wireless Solutions., , , and . VTC Spring, page 1-5. IEEE, (2011)A Novel Adaptive Cooperative MAC Protocol for Wireless LANs., , , and . VTC Spring, page 1-5. IEEE, (2010)Reflectance model of plastic substrate halftone image based on Markov chain., , , , and . Color Imaging: Displaying, Processing, Hardcopy, and Applications, volume 7866 of SPIE Proceedings, page 78661M. SPIE, (2011)An iris quality evaluation method with pre-recognition screening function., , , and . Multim. Tools Appl., 81 (1): 907-925 (2022)Auto3D: Automatic Generation of the Low-Energy 3D Structures with ANI Neural Network Potentials., , , and . J. Chem. Inf. Model., 62 (22): 5373-5382 (2022)Robust H-infinity control for a class of neutral-type systems via sliding mode observer., , and . Appl. Math. Comput., (2015)