Author of the publication

Identity-Based Broadcast Encryption Schemes for Open Networks.

, , , , and . FCST, page 104-109. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

All weather road edge identification based on driving video mining., , and . ITSC, page 1-6. IEEE, (2017)Time Detection Based Hybrid Clustering Strategy for JP-CoMP in LTE-A., , , and . QSHINE, volume 199 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 365-373. Springer, (2016)Packet Forwarding with Minimum Energy Consumption in Body Area Sensor Networks., , and . CCNC, page 1-6. IEEE, (2010)Learning a Practical SDR-to-HDRTV Up-conversion using New Dataset and Degradation Models., , , and . CVPR, page 22231-22241. IEEE, (2023)Design of elliptical-core few-mode fibers for optical parametric amplification., , , , , and . OFC, page 1-3. IEEE, (2017)KECIR at NTCIR-10 Cross-Lingual Link Discovery Task., , , and . NTCIR, National Institute of Informatics (NII), (2013)Diversify or Not: Dynamic Diversification for Personalized Recommendation., , , , , and . PAKDD (2), volume 12713 of Lecture Notes in Computer Science, page 461-472. Springer, (2021)Investigation of Hybrid S-band Amplifier Performance with 8-channel × 10 Gbaud 16-QAM signals., , , , and . ECOC, page 1-3. IEEE, (2021)Semantic Segmentation for Pedestrian Detection from Motion in Temporal Domain., and . ICPR, page 6897-6903. IEEE, (2020)Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication., , , , and . USENIX Security Symposium, page 1-18. USENIX Association, (2021)