Author of the publication

Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability.

, and . J. Inf. Sci. Eng., 33 (4): 873-889 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reversals in stability of linear time-delay systems: A finer characterization., , , , and . Autom., (2019)A Frequency-Sweeping Framework for Stability Analysis of Time-Delay Systems., , , , and . IEEE Trans. Automat. Contr., 62 (8): 3701-3716 (2017)Characterizing invariance properties of linear time-delay systems: The general case., , , , and . CDC, page 1590-1595. IEEE, (2013)Consensus of first-order discrete-time multi-agent systems with time delays., , and . J. Frankl. Inst., 356 (10): 5315-5331 (2019)Colored Stability Crossing Sets for SISO Delay Systems., , , and . IEEE Trans. Automat. Contr., 63 (11): 4016-4023 (2018)A new recognition system for radar emitter signals., and . Kybernetes, 41 (9): 1351-1360 (2012)An Approach to Reliable Software Architectures Evolution., and . QSIC, page 305-312. IEEE, (2013)A sparse control model for image and video editing., , and . ACM Trans. Graph., 32 (6): 197:1-197:10 (2013)A Measurement Allocation for Block Image Compressive Sensing., , and . ICCCS (1), volume 11063 of Lecture Notes in Computer Science, page 110-119. Springer, (2018)A Parallel GNFS Algorithm Based on a Reliable Look-Ahead Block Lanczos Method for Integer Factorization., , , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 110-120. Springer, (2006)