Author of the publication

How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE.

, , and . DBTA, page 95-98. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virus-Evolutionary Genetic Algorithm Based Selective Ensemble for Steganalysis., , and . 3PGCIC, page 553-558. IEEE Computer Society, (2014)New CCA-Secure Proxy Re-encryption Scheme without Random Oracles., , and . CIS, page 377-381. IEEE Computer Society, (2010)VisionFM: a Multi-Modal Multi-Task Vision Foundation Model for Generalist Ophthalmic Artificial Intelligence., , , , , , , , , and 32 other author(s). CoRR, (2023)Leveraging Multimodal Fusion for Enhanced Diagnosis of Multiple Retinal Diseases in Ultra-wide OCTA., , , , , and . CoRR, (2023)Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme., , , and . J. Syst. Softw., 84 (2): 219-225 (2011)VisionCLIP: An Med-AIGC based Ethical Language-Image Foundation Model for Generalizable Retina Image Analysis., , , , and . CoRR, (2024)Video Steganography Algorithm Based on Trailing Coefficients., , , and . INCoS, page 360-364. IEEE, (2015)SSL-ENSAM: Utilizing Sam for Semi-Supervised Retinal Vessel Segmentation with Quality-Aware Enhancement., , , , , , and . ISBI, page 1-5. IEEE, (2024)High-Fidelity Reversible Data Hiding Algorithm Based on SVD., , and . CISIS, volume 772 of Advances in Intelligent Systems and Computing, page 704-712. Springer, (2018)Generative Steganography by Sampling., , , , , , and . IEEE Access, (2019)