Author of the publication

An Efficient and Secure Anonymous Authentication Scheme for VANETs Based on the Framework of Group Signatures.

, , , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Early Classification on Multivariate Time Series with Core Features., , , and . DEXA (1), volume 8644 of Lecture Notes in Computer Science, page 410-422. Springer, (2014)A multi-agent reinforcement learning approach to robot soccer., , and . Artif. Intell. Rev., 38 (3): 193-211 (2012)Study of BBD Ball Mill Load Measure Method Based on Rough Set and NN Information Fusion., , , and . PACIIA (1), page 585-587. IEEE Computer Society, (2008)Probabilistic depth map fusion of Kinect and stereo in real-time., , and . ROBIO, page 2317-2322. IEEE, (2012)A real-time system for 3D recovery of dynamic scene with multiple RGBD imagers., , , , , , and . CVPR Workshops, page 1-8. IEEE Computer Society, (2011)Early prediction on imbalanced multivariate time series., , , and . CIKM, page 1889-1892. ACM, (2013)Ligand entry and exit pathways in the beta2-adrenergic receptor., and . Journal of Molecular Biology, 392 (4): 1102--15 (2009)Lanczos-type variants of the COCR method for complex nonsymmetric linear systems., , , , , , , , and . J. Comput. Phys., 228 (17): 6376-6394 (2009)Solvation effects on alanine dipeptide: A MP2/cc-pVTZ//MP2/6-31G** study of (Φ, Ψ) energy maps and conformers in the gas phase, ether, and water., and . J. Comput. Chem., 25 (14): 1699-1716 (2004)Coupling projection domain decomposition method and Kansa's method in electrostatic problems., , , and . Comput. Phys. Commun., 180 (2): 209-214 (2009)