Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accountable Decryption made Formal and Practical., , , , , and . IACR Cryptol. ePrint Arch., (2023)A density-based clustering structure mining algorithm for data streams., , , and . BigMine, page 69-76. ACM, (2012)An efficient traitor tracing scheme based on MDS code., and . PST, volume 380 of ACM International Conference Proceeding Series, page 34. ACM, (2006)A Stereo Matching Algorithm for Vehicle Binocular System., , , and . ADHIP, volume 279 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 514-523. Springer, (2018)Practical Functional and Washing Droplet Routing for Cross-Contamination Avoidance in Digital Microfluidic Biochips., , , , and . DAC, page 143:1-143:6. ACM, (2014)A Scalable Cross-Chain Access Control and Identity Authentication Scheme., , , , , and . Sensors, 23 (4): 2000 (February 2023)Which log variables significantly predict academic achievement? A systematic review and meta-analysis., and . Br. J. Educ. Technol., 54 (1): 142-191 (January 2023)Practical quantum digital signature with configurable decoy states., , , and . Quantum Inf. Process., 19 (5): 151 (2020)Outlier Detection over Massive-Scale Trajectory Streams., , , and . ACM Trans. Database Syst., 42 (2): 10:1-10:33 (2017)On sampling Kaczmarz-Motzkin methods for solving large-scale nonlinear systems., , , and . Comput. Appl. Math., (April 2023)