Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public Key Encryption with Ranked Multi-keyword Search., and . INCoS, page 109-113. IEEE, (2013)A New ID-Based Deniable Ring Authentication with Constant-Size Signature., and . BMEI, page 1-4. IEEE, (2009)Updatable Hash Proof System and Its Applications., , , , , and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 266-285. Springer, (2015)Representations of Evolutionary Electronics., , , and . ISICA, volume 5370 of Lecture Notes in Computer Science, page 67-78. Springer, (2008)Public-Key Encryption With Keyword Search via Obfuscation., , , and . IEEE Access, (2019)Multi-objective deep reinforcement learning for emergency scheduling in a water distribution network., , , and . Memetic Comput., 14 (2): 211-223 (2022)Multi-Dimensional Data Publishing With Local Differential Privacy., , , , and . EDBT, page 183-194. OpenProceedings.org, (2023)Multi-granularity Deep Vulnerability Detection Using Graph Neural Networks., , , , and . ICONIP (15), volume 1969 of Communications in Computer and Information Science, page 152-164. Springer, (2023)Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application., , , and . Int. J. High Perform. Comput. Netw., 10 (3): 226-239 (2017)Secure and Efficient Cloud Ciphertext Deduplication Based on SGX., , , , and . ICPADS, page 696-703. IEEE, (2022)