Author of the publication

Secure Obfuscation for Tightly Structure-Preserving Encrypted Proxy Signatures.

, , , , and . CIS, page 589-593. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A collection of topological Ramsey spaces of trees and their application to profinite graph theory.. Arch. Math. Log., 57 (7-8): 939-952 (2018)A Secure Obfuscator for Encrypted Blind Signature Functionality., and . IACR Cryptology ePrint Archive, (2013)Features-Based Deisotoping Method for Tandem Mass Spectra., , , , and . Adv. Bioinformatics, (2011)Exploiting structural and topological information to improve prediction of RNA-protein binding sites., and . BMC Bioinform., (2009)SVMtm: Support vector machines to predict transmembrane segments., , and . J. Comput. Chem., 25 (5): 632-636 (2004)Simplify the Basic Artificial Bee Colony Algorithm., , , , , and . SMC, page 2141-2146. IEEE, (2015)Artificial Bee Group Colony Algorithm for Numerical Function Optimization., , , , , and . SMC, page 2914-2919. IEEE, (2015)Attention-aware metapath-based network embedding for HIN based recommendation., , , , and . Expert Syst. Appl., (2021)Reusing wireless power transfer for backscatter-assisted relaying in WPCNs., , , and . Comput. Networks, (2020)Cooperative Lane Changing Strategies to Improve Traffic Operation and Safety Nearby Freeway Off-Ramps in a Connected and Automated Vehicles Environment., , , , and . IEEE Trans. Intell. Transp. Syst., 21 (11): 4605-4614 (2020)