Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Round Witness Hiding Protocol., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (6): 953-960 (2018)A BLS Signature Scheme from Multilinear Maps., and . Int. J. Netw. Secur., 22 (5): 728-735 (2020)Seasonal and Diurnal Variations in Cloud-Top Phase over the Western North Pacific during 2017-2019., , , , , and . Remote. Sens., 13 (9): 1687 (2021)Intelligent Bionic Optimization Algorithm Based on the Growth Characteristics of Tree Branches.. Int. J. Cogn. Informatics Nat. Intell., 15 (2): 34-46 (2021)Construction of applied talents training system based on machine learning under the background of new liberal arts.. PeerJ Comput. Sci., (2023)Multiauthority Traceable Ring Signature Scheme for Smart Grid Based on Blockchain., , , and . Wirel. Commun. Mob. Comput., (2021)Privacy-Preserving Aggregate Signcryption for Vehicular Ad Hoc Networks., , and . ICCSP, page 72-76. ACM, (2018)Universal Designated Verifier Signcryption., , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 126-134. Springer, (2012)Attribute-based non-interactive key exchange., , and . Sci. China Inf. Sci., 60 (1): 19101:1-19101:3 (2017)AIBench: An Agile Domain-specific Benchmarking Methodology and an AI Benchmark Suite., , , , , , , , , and 24 other author(s). CoRR, (2020)