From post

Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems.

, и . IEEE Trans. Vehicular Technology, 51 (6): 1313-1315 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identity-based Password-Authenticated Key Exchange for Client/Server Model., , и . SECRYPT, стр. 45-54. SciTePress, (2012)Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials., , , и . MDM, стр. 187-196. IEEE Computer Society, (2018)A projective clustering algorithm based on significant local dense areas., , , , , и . IJCNN, стр. 1-8. IEEE, (2012)Practical Remote End-to-End Voting Scheme., и . EGOVIS, том 6866 из Lecture Notes in Computer Science, стр. 386-400. Springer, (2011)Distributed Association Rule Mining with Minimum Communication Overhead., , и . AusDM, том 101 из CRPIT, стр. 17-24. Australian Computer Society, (2009)面向云环境的一致性可验证单关键词检索方法 (Integrity-verifying Single Keyword Search Method in Clouds)., , , , и . 计算机科学, 45 (12): 92-97 (2018)A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity., и . AsiaCCS, стр. 613-620. ACM, (2019)Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments., , , , и . Inf. Process. Lett., (2022)Efficient Two-Server Password-Only Authenticated Key Exchange., , и . IEEE Trans. Parallel Distributed Syst., 24 (9): 1773-1782 (2013)Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud., , , , и . IEEE Trans. Parallel Distributed Syst., 31 (11): 2668-2681 (2020)