Author of the publication

A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion.

, , , , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 559-577. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel pairing-free certificateless authenticated key agreement protocol with provable security., , , and . Frontiers Comput. Sci., 7 (4): 544-557 (2013)'q-\Titration\' of long-chain and short-chain lipids differentiates between structured and mobile residues of membrane proteins studied in bicelles by solution \NMR\ spectroscopy, , , , , , , , and . J. Magn. Reson., 214 (1): 111--118 (January 2012)Structural determination of virus protein \U\ from \HIV\-1 by \NMR\ in membrane environments, , , , and . Biochim. Biophys. Acta, 1848 (11 Pt A): 3007--3018 (November 2015)Low‐Temperature Solution‐Processed CuCrO2 Hole‐Transporting Layer for Efficient and Photostable Perovskite Solar Cells, , , , , , and . Advanced Energy Materials, (May 2018)Three-dimensional Discrete Element Method simulation system of the interaction between irregular structure wheel and lunar soil simulant., , , , , , , and . Adv. Eng. Softw., (2020)N(6)-methyladenosine-binding protein YTHDF1 suppresses EBV replication and promotes EBV RNA decay, , , , , , , , , and 18 other author(s). EMBO reports, n/a (n/a): e50128 (2021)Sim2Word: Explaining Similarity with Representative Attribute Words via Counterfactual Explanations., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (6): 220:1-220:22 (November 2023)The Evaluation of FY-3E Hyperspectral Infrared Atmospheric Sounder-II Long-Wave Temperature Sounding Channels., , , , and . Remote. Sens., 15 (23): 5525 (December 2023)Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture., , , and . IEEE Access, (2019)KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network., , , , and . Soft Comput., 24 (2): 965-980 (2020)