Author of the publication

改进的无证书广义指定验证者聚合签名方案 (Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier).

, , , , , and . 计算机科学, 44 (8): 168-175 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme., , , and . CISP-BMEI, page 1-9. IEEE, (2018)Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme., , , and . ICCNS, page 12-16. ACM, (2018)Intrusion Detection Method Based On Improved Conditional Generative Adversarial Network., and . AIIPCC, page 37-40. IEEE, (2022)App Tamper Detection and Retrospective Program Research.. CSoNet, volume 11280 of Lecture Notes in Computer Science, page 318-329. Springer, (2018)改进的无证书广义指定验证者聚合签名方案 (Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier)., , , , , and . 计算机科学, 44 (8): 168-175 (2017)OEA_SAT: An Organizational Evolutionary Algorithm for solving SATisfiability problems., , , and . IEEE Congress on Evolutionary Computation, page 765-770. IEEE, (2009)Research on Collaboration Software Based on JBPM and Lightweight J2EE Framework., , and . ICEE, page 191-194. IEEE Computer Society, (2010)Approach for Name Ambiguity Problem Using a Multiple-Layer Clustering., , , , and . CSE (4), page 874-878. IEEE Computer Society, (2009)Cryptography Teaching Based on Problem Oriented: Take the Knowledge Point of Designated Verifier Signature as an Example., , , , and . ICEBT, page 73-77. ACM, (2018)Research on Human Fall Detection Based on Tiny-yolov3 Algorithm., and . EITCE, page 1326-1330. ACM, (2021)