Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Research on Identity Authentication Scheme of Internet of Things Equipment in 5G Network Environment., , , , and . ICCT, page 312-316. IEEE, (2019)A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme., , , and . CollaborateCom, volume 10 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 416-424. Springer / ICST, (2008)Some basic principles for proxy signature schemes based on ECDLP., , and . CollaborateCom, page 1-5. ICST / IEEE, (2010)Position-based proxy signcryption., , , , and . ICCC, page 1-6. IEEE, (2015)Multi-proxy Multi-signature Binding Positioning Protocol., , , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 9-18. Springer, (2015)A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem., , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 662-665. Springer, (2004)A Threshold Proxy Signature Scheme Using Self-Certified Public Keys., and . ISPA, volume 3358 of Lecture Notes in Computer Science, page 715-724. Springer, (2004)A Virtual Network Embedding Algorithm Based on RBF Neural Network., , , and . CSE/EUC (1), page 393-396. IEEE Computer Society, (2017)Efficient Non-interactive Deniable Authentication Protocols., , , and . CIT, page 673-679. IEEE Computer Society, (2005)Positioning-Protocol-Based Digital Signature., , and . WICON, volume 146 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 167-172. Springer, (2014)