Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information-Theoretically Secure String Commitments Based on Packet Reordering Channels., , , and . IEEE Access, (2021)An information theoretical model for quantum secret sharing., , , , and . Quantum Inf. Comput., 5 (1): 69-80 (2005)Transport mode assessment for inbound logistics: A study based on coffee industry., , , , and . SMC, page 1318-1323. IEEE, (2014)A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM., , , , and . IACR Cryptology ePrint Archive, (2017)Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy., , , and . IACR Cryptol. ePrint Arch., (2021)Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions., , , and . Comput. J., 58 (10): 2738-2746 (2015)Road network compression techniques in spatiotemporal embedded systems: a survey., , , , , and . IWGS, page 33-36. ACM, (2014)Efficient fully simulatable oblivious transfer from the McEliece assumptions., and . ITW, page 638-642. IEEE, (2011)Cost-adaptive Neural Networks for Peak Volume Prediction with EMM Filtering., , , and . IEEE BigData, page 4208-4213. IEEE, (2019)On the Oblivious Transfer Capacity of the Erasure Channel., , and . ISIT, page 1428-1431. IEEE, (2006)