Author of the publication

An Authenticated 3-Round Identity-Based Group Key Agreement Protocol.

, , and . ARES, page 538-543. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved clustering validity index for determining the number of malware clusters, , , and . Anti-counterfeiting, Security, and Identification in Communication, 2009. ASID 2009. 3rd International Conference on, page 544 -547. (August 2009)A DNA sequence distance measure approach for phylogenetic tree construction., and . BIC-TA, page 204-212. IEEE, (2010)CIMDS: Adapting Postprocessing Techniques of Associative Classification for Malware Detection., , , and . IEEE Trans. Syst. Man Cybern. Part C, 40 (3): 298-307 (2010)PFBNet: a priori-fused boosting method for gene regulatory network inference., , , and . BMC Bioinform., 21 (1): 308 (2020)An Improved Initialization Method for Clustering High-Dimensional Data., and . DBTA, page 1-4. IEEE, (2010)Cache-based Optimization for Block Commit of Hyperledger Fabric., , , and . ICDM (Workshops), page 902-906. IEEE, (2020)Exploring Auxiliary Reasoning Tasks for Task-oriented Dialog Systems with Meta Cooperative Learning., , , , , and . AAAI, page 13701-13708. AAAI Press, (2021)Low latency Improved Weighted Hard-Decision LDPC Algorithm for 5G NR., , and . ICCCS, page 861-867. IEEE, (2021)A Supervised Learning Model for Detecting Ponzi Contracts in Ethereum Blockchain., , and . ICBDS, volume 1563 of Communications in Computer and Information Science, page 657-672. Springer, (2021)Research & application of Metadata Management System based on data warehouse for banks., , , , , and . ISKE, page 384-388. IEEE, (2008)