Author of the publication

Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems.

, and . IEEE Trans. Vehicular Technology, 51 (6): 1313-1315 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers., , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 428-442. Springer, (2003)Integrated production and Transportation Scheduling in supply Chain optimisation., and . SEAL, volume 2 of Advances in Natural Computation, page 406-425. World Scientific, (2002)Fast Modular network implementation for support vector machines., , , and . IEEE Trans. Neural Networks, 16 (6): 1651-1663 (2005)Improving Object Oriented Analysis by Explicit Change Analysis., , , and . TOOLS (36), page 2-7. IEEE Computer Society, (2000)Extreme learning machine: a new learning scheme of feedforward neural networks., , and . IJCNN, page 985-990. IEEE, (2004)Scalable Distributed-FDPS Algorithm for QoS Provisioning., , , , and . INC, page 31-40. University of Plymouth, (2010)Real-time learning capability of neural networks., , and . IEEE Trans. Neural Networks, 17 (4): 863-878 (2006)Optimal Chache Allocation and Probabilistic Caching for Local Loss Recovery in Reliable Multicast., , , and . ICC (3), page 1401-1405. IEEE, (2000)ATM Traffic Control Using AI Techniques., , and . Applied Informatics, page 36-37. IASTED/ACTA Press, (1999)An Opportunistic Scheduling Algorithm for MPEG Video Over Shared Wireless Downlink., , and . ICC, page 872-877. IEEE, (2006)