Author of the publication

On the Security of a Certificateless Searchable Public Key Encryption Scheme.

, , , , and . ICGEC, volume 536 of Advances in Intelligent Systems and Computing, page 113-119. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on Information and Integrated of MES Big Data and Semiconductor Process Furnace Automation., , , , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 669-678. Springer, (2018)Adaptive Kernel Discriminant Analysis and its Applications on Pattern Recognition., and . Int. J. Inf. Acquis., 3 (4): 329-337 (2006)Multiple Watermarking in Visual Cryptography., , and . IWDW, volume 5041 of Lecture Notes in Computer Science, page 60-70. Springer, (2007)Differential evolution utilizing a handful top superior individuals with bionic bi-population structure for the enhancement of optimization performance., , and . Enterprise IS, 14 (2): 221-242 (2020)An Improved Integer Transform Combining with an Irregular Block Partition., , , , , and . Symmetry, 11 (1): 49 (2019)3-D Terrain Node Coverage of Wireless Sensor Network Using Enhanced Black Hole Algorithm., , , and . Sensors, 20 (8): 2411 (2020)A Criterion for Learning the Data-Dependent Kernel for Classification., , and . ADMA, volume 4632 of Lecture Notes in Computer Science, page 365-376. Springer, (2007)Image-matching framework based on region partitioning for target image location., , , , , and . Telecommun. Syst., 74 (3): 269-286 (2020)Reversible watermarking resistant to cropping attack., , and . IET Inf. Secur., 1 (2): 91-95 (2007)Guest Editorial., , , and . J. Networks, 5 (3): 265-266 (2010)