Author of the publication

Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks.

, , , and . Sci. China Inf. Sci., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Self-Supervised Learning Model for Unknown Internet Traffic Identification Based on Surge Period., , and . Future Internet, 14 (10): 289 (2022)PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks., , , , and . NaNA, page 5-10. IEEE Computer Society, (2017)Deep Low Light Image Enhancement Via Multi-Scale Recursive Feature Enhancement and Curve Adjustment., , and . ICASSP, page 1-5. IEEE, (2023)Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks., , , and . Sci. China Inf. Sci., (2021)Asymmetric Group Key Agreement with Traitor Traceability., , and . CIS, page 347-351. IEEE Computer Society, (2010)Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health., , , , , , and . NaNA, page 319-324. IEEE, (2019)Social relationship for physical objects., , , and . Int. J. Distributed Sens. Networks, (2018)LF-ViT: Reducing Spatial Redundancy in Vision Transformer for Efficient Image Recognition., , , , , , and . AAAI, page 2274-2284. AAAI Press, (2024)A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 1287-1294. Springer, (2005)A New Public Key Certificate Revocation Scheme Based on One-Way Hash Chain., , , and . WAIM, volume 3739 of Lecture Notes in Computer Science, page 670-675. Springer, (2005)