From post

A Convertible Designated Verifible Blind Multi-signcryption Scheme.

, , и . ACC (4), том 193 из Communications in Computer and Information Science, стр. 549-556. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient Indexing Scheme for Iris Biometric Using K-d-b Trees., и . ICIC (2), том 7996 из Lecture Notes in Computer Science, стр. 475-484. Springer, (2013)Cryptanalysis and Enhancement of an Anonymous Self-Certified Key Exchange Protocol., , и . Wirel. Pers. Commun., 99 (2): 863-891 (2018)An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP., и . IACR Cryptology ePrint Archive, (2009)Support vector regression based image restoration., и . FUZZ-IEEE, стр. 1-8. IEEE, (2013)IAMMAC: an interference-aware multichannel MAC protocol for wireless sensor-actor networks., , и . Int. J. Commun. Syst., 29 (4): 801-822 (2016)A Strong Designated Verifiable DL Based Signcryption Scheme., и . J. Inf. Process. Syst., 8 (4): 567-574 (2012)Real-time iris segmentation based on image morphology., , и . ICCCS, стр. 335-338. ACM, (2011)Improved offline signature verification scheme using feature point extraction method., , , и . IEEE ICCI, стр. 475-480. IEEE Computer Society, (2008)Gray level co-occurrence matrix and random forest based acute lymphoblastic leukemia detection., , , и . Biomed. Signal Process. Control., (2017)An ID-based Non-Interactive Deniable Authentication Protocol based on ECC., , и . ICCNS, стр. 48-52. ACM, (2017)