Author of the publication

Key-Insulated Group Signature Scheme with Verifier-Local Revocation.

, , , , and . SNPD (3), page 273-278. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Violations of Programming Styles: Insights from Open Source Projects., , and . CSAI/ICIMT, page 185-189. ACM, (2018)Properties Emulation on TD-LTE Electric Power Wireless Private., , and . ICCCS (5), volume 11067 of Lecture Notes in Computer Science, page 563-573. Springer, (2018)A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemes., , , , , and . PAISI, volume 7299 of Lecture Notes in Computer Science, page 190-197. Springer, (2012)Representing and Reasoning on Feature Architecture: A Description Logic Approach., and . FICS, volume 2001-14 of Technical Report, page 71-77. University of Karlsruhe, Institut für Programmstrukturen und Datenorganisation, (2001)A Digital Watermarking Algorithm for Trademarks Based on U System., , , , and . ICIG (1), volume 9217 of Lecture Notes in Computer Science, page 43-52. Springer, (2015)Low power network processor design using clock gating., , , and . DAC, page 712-715. ACM, (2005)Channel reservation and queuing in Low Earth Orbit mobile satellite system., and . ICUMT, page 734-738. IEEE, (2010)Remote data possession checking with privacy-preserving authenticators for cloud storage., , , , , and . Future Gener. Comput. Syst., (2017)Diffusion-based EM gradient algorithm for density estimation in sensor networks., and . SPAWC, page 1-5. IEEE, (2016)Probabilistic assessment of the impact of distributed generation and non-linear load on harmonic propagation in power networks., , , and . PSCC, page 1-7. IEEE, (2014)