Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme., and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 93-104. Springer, (2007)Identity-Based Key Issuing Without Secure Channel in a Broad Area., and . WISA, volume 4298 of Lecture Notes in Computer Science, page 30-44. Springer, (2006)A Key Recovery Mechanism for Reliable Group Key Management., and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 372-386. Springer, (2003)Integration Analysis of Diverse Genomic Data Using Multi-clustering Results., , , and . ISBMDA, volume 4345 of Lecture Notes in Computer Science, page 37-48. Springer, (2006)Company Name Discrimination in Tweets using Topic Signatures Extracted from News Corpus., , and . JCSE, (2016)Asynchronous Edge Learning using Cloned Knowledge Distillation., , and . CoRR, (2020)Efficient Unilateral Authentication Mechanism for MIPv6., , , and . International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 908-911. Springer, (2006)An Empirical Study on the Change of Web Pages., and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 632-642. Springer, (2005)An Efficient Device Authentication Protocol Using Bioinformatic., , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 567-575. Springer, (2006)Comparative Performance of State-of-the-Art Classifiers in Computer-Aided Detection for CT Colonography., , and . Abdominal Imaging, volume 7601 of Lecture Notes in Computer Science, page 78-87. Springer, (2012)