Author of the publication

Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features.

, , , , , , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 430-446. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System., , , , , , and . IEEE Internet Things J., 10 (19): 16715-16726 (October 2023)A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT., , , , , , and . IEEE Trans. Ind. Informatics, 18 (7): 4456-4465 (2022)VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data., , , , , , , and . IEEE Trans. Serv. Comput., 16 (1): 698-710 (January 2023)Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing., , , , , , and . IEEE Trans. Serv. Comput., 16 (1): 504-514 (January 2023)Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis., , , , and . IEEE Trans. Knowl. Data Eng., 35 (6): 5665-5679 (June 2023)μDep: Mutation-based Dependency Generation for Precise Taint Analysis on Android Native Code., , , , , and . CoRR, (2021)Collaborative 'many to many' DDoS detection in cloud., , and . Int. J. Ad Hoc Ubiquitous Comput., 23 (3/4): 192-202 (2016)A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Bio-physiological-signals-based VR cybersickness detection., , , and . CCF Trans. Pervasive Comput. Interact., 4 (3): 268-284 (2022)Homomorphic Compression: Making Text Processing on Compression Unlimited., , , , , , , and . Proc. ACM Manag. Data, 1 (4): 271:1-271:28 (December 2023)