Author of the publication

On provably secure code-based multiple grade proxy signature scheme.

, , and . Int. J. High Perform. Syst. Archit., 5 (1): 19-24 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two modifications of efficient newton-type iterative method and two variants of Super-Halley's method for solving nonlinear equations., and . J. Comput. Methods Sci. Eng., 19 (1): 13-22 (2019)Two rank approximations for low-rank based subspace clustering., , , and . CISP-BMEI, page 1-6. IEEE, (2017)A nonmonotone inexact smoothing Newton-type method for P0-NCP based on a parametric complementarity function., , and . J. Num. Math., 23 (4): 303-316 (2015)Dynamic Magnetic Resonance Imaging via Nonconvex Low-Rank Matrix Approximation., , , , , , and . IEEE Access, (2017)Multiple Attribute Authorities Attribute-Based Designated Confirmer Signature Scheme with Unified Verification., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (11): 2341-2348 (2015)On provably secure code-based multiple grade proxy signature scheme., , and . Int. J. High Perform. Syst. Archit., 5 (1): 19-24 (2014)A Non-interior Point Continuation Algorithm Based on Orthogonal Projection for Second-Order Cone Programming., , , and . ICNC (3), page 481-485. IEEE Computer Society, (2009)Privacy-Preserving SVM Classification on Vertically Partitioned Data without Secure Multi-party Computation., , and . ICNC (1), page 543-546. IEEE Computer Society, (2009)A new smoothing Newton-type method for second-order cone programming problems., , and . Appl. Math. Comput., 215 (3): 1020-1029 (2009)