Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Second-Course Esophageal Gross Tumor Volume Segmentation in CT with Prior Anatomical and Radiotherapy Information., , , , , , and . MICCAI (7), volume 14226 of Lecture Notes in Computer Science, page 511-520. Springer, (2023)Optimistic Fair-exchange Protocols Based on DSA Signatures., , and . IEEE SCC, page 498-501. IEEE Computer Society, (2004)Towards the Predictability of IPFS Nodes' Session Time Using Machine Learning., , , , and . ACM TUR-C, page 61-62. ACM, (2023)A proxy blind signature schemes based DLP and applying in e-voting., , and . ICEC, volume 113 of ACM International Conference Proceeding Series, page 641-645. ACM, (2005)Secure Efficient Proxy Blind Signature Schemes Based DLP., , and . CEC, page 452-455. IEEE Computer Society, (2005)Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles., , , and . CANS, volume 3810 of Lecture Notes in Computer Science, page 334-348. Springer, (2005)A fair e-cash payment scheme based on credit., , and . ICEC, volume 113 of ACM International Conference Proceeding Series, page 622-626. ACM, (2005)A Real Implementation of DPI in 3G Network., , , , , , , , and . GLOBECOM, page 1-5. IEEE, (2010)Fair E-cash Payment Model on Credit Overdraft., , and . APSCC, page 107-111. IEEE Computer Society, (2006)Delegation Depth Control in Trust-Management System., , and . AINA, page 411-414. IEEE Computer Society, (2005)