Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward optimizing cauchy matrix for cauchy reed-solomon code., , , , and . IEEE Communications Letters, 13 (8): 603-605 (2009)Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model., , and . Informatica, 23 (3): 443-460 (2012)Adaptively Secure Threshold Signature Scheme in the Standard Model., , and . Informatica, 20 (4): 591-612 (2009)Design methodology for the IBM POWER7 microprocessor., , , , , , , , , and 15 other author(s). IBM J. Res. Dev., 55 (3): 9 (2011)Bounded-collusion decentralized ABE with sublinear parameters., , , , and . Theor. Comput. Sci., (June 2023)Power grid analysis using random walks., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 24 (8): 1204-1224 (2005)A new threshold proxy signature scheme from bilinear pairings., , and . Sci. China Ser. F Inf. Sci., 47 (5): 612-622 (2004)PartitionChain: A Scalable and Reliable Data Storage Strategy for Permissioned Blockchain., , and . IEEE Trans. Knowl. Data Eng., 35 (4): 4124-4136 (April 2023)Parameters of Squares of Primitive Narrow-Sense BCH Codes and Their Complements., , , and . IEEE Trans. Inf. Theory, 69 (8): 5017-5031 (August 2023)Privacy-Preserving Federated Learning via Functional Encryption, Revisited., , , and . IEEE Trans. Inf. Forensics Secur., (2023)