Author of the publication

An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive cosine transform coding using marginal analysis., and . Visual Information Processing, volume 2488 of SPIE Proceedings, page 162-167. SPIE, (1995)A smart telemetry compression system for a space instrument: MARS-96 ELISMA instrument complex., , , , and . Microprocess. Microsystems, 20 (1): 17-30 (1996)Adaptive cosine transform coding for compression of Mars-96 ELISMA instrument data., and . Microprocess. Microsystems, 19 (5): 277-282 (1995)A fast-adaptive Huffman coding algorithm., and . IEEE Trans. Commun., 41 (4): 535-538 (1993)Data compression for space applications.. University of Sussex, Falmer, East Sussex, UK, (1992)British Library, EThOS.Handwritten digits recognition with neural networks and fuzzy logic., , and . ICNN, page 1389-1392. IEEE, (1995)A New Algorithm for Handling Continuous-Valued Attributes in Decision Tree Generation and its Application to Drawing Recognition., and . IEA/AIE, page 435-442. ACM, (1995)A modified Hamming neural network with different thresholds and multi-valued weights., , and . ICNN, page 1012-1016. IEEE, (1996)Downlink compressive channel estimation with support diagnosis in FDD massive MIMO., , , and . EURASIP J. Wireless Comm. and Networking, (2018)Efficient halftone image steganography based on dispersion degree optimization., , , , , and . J. Real-Time Image Processing, 16 (3): 601-609 (2019)