Author of the publication

PSEEMV: Provably secure and efficient emergency message verification scheme based on ECC and CRT for Space Information Network.

, , , and . J. Inf. Secur. Appl., (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Discrete Sell or Hold Problem with Constraints on Asset Values.. CoRR, (2014)Social-Aware and Sequential Embedding for Cold-Start Recommendation., , , , , and . KSEM (1), volume 11775 of Lecture Notes in Computer Science, page 60-71. Springer, (2019)On the complexity of equilibria in markets with additively separable utilities., , , and . BQGT, page 61:1. ACM, (2010)Tighter Robust Upper Bounds for Options via No-Regret Learning., , and . AAAI, page 5348-5356. AAAI Press, (2023)Attention-Based Knowledge Tracing with Heterogeneous Information Network Embedding., , , , , and . KSEM (1), volume 12274 of Lecture Notes in Computer Science, page 95-103. Springer, (2020)Hybrid Decision Based Chinese News Headline Classification., , , , and . APWeb/WAIM Workshops, volume 11268 of Lecture Notes in Computer Science, page 3-12. Springer, (2018)Uniform and Non-uniform Sampling Methods for Sub-linear Time k-means Clustering., and . ICPR, page 7775-7781. IEEE, (2020)Experiment of Event Injection Technology for Network Dependability Evaluation., , and . International Conference on Computational Science (3), volume 4489 of Lecture Notes in Computer Science, page 141-144. Springer, (2007)Visual Grounding with Transformers., , , and . ICME, page 1-6. IEEE, (2022)IADIDF: A Framework for Intrusion Detection., , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 895-898. Springer, (2004)