Author of the publication

How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE.

, , and . DBTA, page 95-98. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conceptual Model Development of Dispatching Team Task Complexity for Metro Operating Control Center., , , and . IEEE Intell. Transp. Syst. Mag., 13 (3): 174-191 (2021)CGDC- LSTM: A novel hybrid neural network model for MOOC dropout prediction., , , , and . IJCNN, page 1-8. IEEE, (2023)An Authenticating Algorithm with Multi-compression Compatible in DCT Domain., , , and . IAS, page 11-14. IEEE Computer Society, (2009)Learning Trend Analysis and Prediction Based on Knowledge Tracing and Regression Analysis., , , and . DASFAA Workshops, volume 9052 of Lecture Notes in Computer Science, page 29-41. Springer, (2015)Investigation on principles for cost assignment in motion vector-based video steganography., , , and . J. Inf. Secur. Appl., (March 2023)How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE., , and . DBTA, page 95-98. IEEE Computer Society, (2009)A Novel Information Hiding Algorithm Based on Grey Relational Analysis for H.264/AVC., , , and . INCoS, page 365-369. IEEE, (2015)Regional Localization of Mouse Brain Slices Based on Unified Modal Transformation., , , , , , , and . Symmetry, 13 (6): 929 (2021)Research on Adaptive Video Steganography Algorithm for Clustering and Dispersing DCT Coefficient Difference Histogram., , , and . NCTCS, volume 1494 of Communications in Computer and Information Science, page 3-14. Springer, (2021)Motion vector-domain video steganalysis exploiting skipped macroblocks., , , , and . IET Image Process., 18 (5): 1132-1144 (2024)