Author of the publication

A Multi-secret Sharing Scheme in an Access Structure.

, , and . Security and Management, page 481-484. CSREA Press, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralised adaptive output feedback control for interconnected nonlinear systems preceded by unknown hysteresis., , and . Int. J. Control, 88 (9): 1712-1725 (2015)Unknown place name detection base on YamCha for Japanese guidance QA system., and . NLPKE, page 1-5. IEEE, (2009)Woodblock image decomposition of Chinese new year paintings., , , , and . Multimedia Tools Appl., 78 (6): 7621-7641 (2019)Using Stem Rules to Refine Document Retrieval Queries., , , and . FQAS, volume 1495 of Lecture Notes in Computer Science, page 248-259. Springer, (1998)Distributed Enhanced Inter-Cell Interference Coordination (eICIC) in LTE-Advanced HetNets: A Potential Game Approach., , and . VTC Spring, page 1-5. IEEE, (2015)Action2Activity: Recognizing Complex Activities from Sensor Data., , , , and . IJCAI, page 1617-1623. AAAI Press, (2015)Is the Heap Manager Important to Many Cores?, , and . ROSS@HPDC, page 5:1-5:6. ACM, (2018)Guided-KNOWLA: The Use of Guided Unscrambling to Enhance Active Online Learning., and . L@S, page 42:1-42:4. ACM, (2019)Dual Connectivity in Backhaul-Limited Massive-MIMO HetNets: User Association and Power Allocation., , and . GLOBECOM, page 1-6. IEEE, (2017)Entropic uncertainty relations in the spin-1 Heisenberg model., , , and . Quantum Inf. Process., 18 (3): 70 (2019)