Author of the publication

An Approach to Convert Any Threshold Signature into a Threshold Group Signature.

, , , and . SNPD (2), page 723-726. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile VR Game Design for Stroke Rehabilitation., , , , , and . HCI (12), volume 10912 of Lecture Notes in Computer Science, page 95-116. Springer, (2018)Designing Succinct Secondary Indexing Mechanism by Exploiting Column Correlations., , , , and . SIGMOD Conference, page 1223-1240. ACM, (2019)Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005., , , , and . ProvSec, volume 5324 of Lecture Notes in Computer Science, page 176-184. Springer, (2008)Substrate thickness effect on transformer., , , and . ISIC, page 1-4. IEEE, (2016)Demonstrating Spindra: A Geographic Knowledge Graph Management System., , and . ICDE, page 2044-2047. IEEE, (2019)Geospatial Data Management in Apache Spark: A Tutorial., and . ICDE, page 2060-2063. IEEE, (2019)Forward Secure Threshold Signature Scheme from Bilinear Pairings., , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 587-597. Springer, (2006)Video-Based Real Time Analysis of Plankton Particle Size Spectrum., , , , , , , , and . IEEE Access, (2019)KNN-based weighted rough ν-twin support vector machine., , and . Knowl. Based Syst., (2014)An end-to-end neural network approach to story segmentation., , , and . APSIPA, page 171-176. IEEE, (2017)