Author of the publication

On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key.

, , , and . Informatica (Slovenia), 29 (3): 243-346 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Subnet Partition of the Switched Ethernet Based on Real-time., , and . PACCS, page 171-174. IEEE Computer Society, (2009)The factor impact to the development of prefabricated construction industry chain based on structural equation models., and . Int. J. Model. Identif. Control., 38 (3/4): 342-354 (2021)Time-Aware Smart Object Recommendation in Social Internet of Things., , , and . IEEE Internet of Things Journal, 7 (3): 2014-2027 (2020)Use of a Cz Common-Mode Capacitor in Two-Wire and Three-Wire Offline Power Supplies., , , and . IEEE Trans. Ind. Electron., 55 (3): 1435-1443 (2008)Design of a Power Piezoelectric Transformer for a PFC Electronic Ballast., , , , , and . IEEE Trans. Ind. Electron., 54 (6): 3197-3204 (2007)A comparative study on algorithms for optimizing Debye model of tissue dielectric properties., , , , and . BMEI, page 317-321. IEEE, (2013)Bilu-Linial stability, certified algorithms and the Independent Set problem., , , , and . CoRR, (2018)Sharp Statistical Guarantees for Adversarially Robust Gaussian Classification., , and . CoRR, (2020)On Low Rank Approximation of Binary Matrices., , , , and . CoRR, (2015)Performance and optimisation of agent compression and forwarding system for correlated sources., , and . IET Commun., 13 (16): 2523-2532 (2019)