Author of the publication

Algorithm Substitution Attacks on Identity-Based Encryption.

, , , , and . SocialSec, volume 1663 of Communications in Computer and Information Science, page 15-31. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Electrical Simulations of Thin-Film Gated SOI Lateral PIN Photodetectors for High Sensitivity and Speed Performances., , , , and . NCCET, volume 396 of Communications in Computer and Information Science, page 235-243. Springer, (2013)Inversion symmetry and bulk Rashba effect in methylammonium lead iodide perovskite single crystals, , , , , , , , , and . Nature Communications, 9 (1): 1829-- (2018)Surface Restructuring of Hybrid Perovskite Crystals, , , , , , , , , and 8 other author(s). ACS Energy Letters, 1 (6): 1119-1126 (2016)Validity of a new designed constant workload cycle ergometer for assessing cardiopulmonary function., , , , and . CISP-BMEI, page 1-5. IEEE, (2017)Large-scale prediction of drug-target interactions from deep representations., , and . IJCNN, page 1236-1243. IEEE, (2016)An interval-coefficient fuzzy binary linear programming, the solution, and its application under uncertainties., and . JORS, 64 (10): 1557-1569 (2013)Research on Energy Interconnection Oriented Big Data Sharing Platform Reference Architecture., , , , and . LSMS/ICSEE (3), volume 763 of Communications in Computer and Information Science, page 217-225. Springer, (2017)Evaluation of Topological Vulnerability of the Internet under Regional Failures., , , and . ARES, volume 6908 of Lecture Notes in Computer Science, page 164-175. Springer, (2011)Flash memory management based on predicted data expiry-time in embedded real-time systems., , , and . SAC, page 1477-1481. ACM, (2008)A reliable B-tree implementation over flash memory., , , and . SAC, page 1487-1491. ACM, (2008)