Author of the publication

Server-Aided Verification Proxy Re-signature.

, and . TrustCom/ISPA/IUCC, page 1704-1707. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accurate Power Sharing and Synthetic Inertia Control for DC Building Microgrids With Guaranteed Performance., , , , , and . IEEE Access, (2019)CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency., and . ISC, volume 9290 of Lecture Notes in Computer Science, page 319-335. Springer, (2015)Extended Prony Analysis on Power System Oscillation Under a Near-Resonance Condition., , , , and . CoRR, (2020)Leakage resilient CCA secure IBE with all-but-one lossy filter.. Int. J. Ad Hoc Ubiquitous Comput., 21 (4): 266-272 (2016)Multi-scale flexibility assessment of electrical, thermal and gas multi-energy systems based on morphological decomposition., , , , , and . J. Comput. Methods Sci. Eng., 23 (6): 2975-2991 (2023)Evaluating Load Models and Their Impacts on Power Transfer Limits., , , , , , and . ICCA, page 1106-1111. IEEE, (2020)TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU., , , , , and . HPCA, page 922-934. IEEE, (2023)Distributed IoT monitoring model using multi-core sensing function integration., , and . J. Intell. Fuzzy Syst., 40 (2): 2827-2837 (2021)Raceway Defect Features of a High-Speed Train Axle Box Bearing in the Vehicle-Track Coupled System., , , , and . IEEE Trans. Instrum. Meas., (2023)Enabling Model-Based LTI for Large-Scale Power System Security Monitoring and Enhancement With Graph-Computing-Based Power Flow Calculation., , , , , , and . IEEE Access, (2019)