Author of the publication

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model.

, , , and . KSII Trans. Internet Inf. Syst., 10 (5): 2427-2445 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architecture of a novel DRM system., , and . IASTED Conf. on Software Engineering, page 78-83. IASTED/ACTA Press, (2004)Application of Synthetic NDVI Time Series Blended from Landsat and MODIS Data for Grassland Biomass Estimation., , , , , and . Remote Sensing, 8 (1): 10 (2016)BP Neural Networks Based Soft Measurement of Rheological Properties of CWS., and . ISNN (4), volume 56 of Advances in Intelligent and Soft Computing, page 579-586. Springer, (2009)A Network Storage Framework for Internet of Things., , and . ANT/SEIT, volume 19 of Procedia Computer Science, page 1136-1141. Elsevier, (2013)Tackling Polytype Queries in Inconsistent Databases: Theory and Algorithm., , and . J. Softw., 7 (8): 1861-1866 (2012)Deep Deterministic Policy Gradients with Transfer Learning Framework in StarCraft Micromanagement., and . EIT, page 410-415. IEEE, (2019)Progressive and multi-level secret image sharing scheme with hierarchical shadows., , , , and . Multim. Tools Appl., 81 (21): 31039-31059 (2022)Efficient prediction method of triple failure pressure for corroded pipelines under complex loads based on a backpropagation neural network., , , , , , and . Reliab. Eng. Syst. Saf., (2023)Traceable Scheme of Public Key Encryption with Equality Test., , , and . Entropy, 24 (3): 309 (2022)Semi-tensor compressed sensing., , , and . Digit. Signal Process., (2016)