Author of the publication

Formal Security Treatments for Signatures from Identity-Based Encryption.

, , , , and . ProvSec, volume 4784 of Lecture Notes in Computer Science, page 218-227. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generalized Doubly Robust Learning Framework for Debiasing Post-Click Conversion Rate Prediction., , , , , , , and . KDD, page 252-262. ACM, (2022)Analysis of Human Factor in Air Traffic Control Unsafe Events Based on Improved DECIDE Model., , , and . HCI (5), volume 12185 of Lecture Notes in Computer Science, page 365-374. Springer, (2020)An Ontology-Based Advisement Approach for SOA Design Patterns., , , , and . KMO, page 73-84. Springer, (2013)Region based saliency detection by learning background information., , and . BMSB, page 1-6. IEEE, (2014)Incremental Evaluation of Visible Nearest Neighbor Queries., , and . IEEE Trans. Knowl. Data Eng., 22 (5): 665-681 (2010)Recursive partitioning method for trajectory indexing., , , and . ADC, volume 104 of CRPIT, page 37-46. Australian Computer Society, (2010)Efficient Human Body Configuration using MCMC., and . IEC (Prague), page 272-276. Enformatika, Çanakkale, Turkey, (2005)Stability of Solutions of Discrete Reflected BSDEs., , and . GrC, page 428-431. IEEE, (2008)Automatic seizure detection using a novel EEG feature based on nonlinear complexity., and . IJCNN, page 1686-1695. IEEE, (2016)Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay., and . J. Sel. Topics Signal Processing, 10 (8): 1449-1461 (2016)