Author of the publication

Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.

, , and . Comput. J., 62 (4): 631-640 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Android Malicious Code Detection Method Based on Improved DCA Algorithm., , , , , and . Entropy, 19 (2): 65 (2017)Image compression based on orthogonal balanced multiwavelets with symmetry/antisymmetry., and . MIPPR, volume 10611 of SPIE Proceedings, page 106110Y. SPIE, (2017)Generalized Snell's Law and Its Verification by Metasurface., and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 364-372. Springer, (2020)Sub-1 ns characterization methodology for transistor electrical parameter extraction., , , , , and . Microelectron. Reliab., (2018)A Novel NE-DFT Channel Estimation Scheme for Millimeter-Wave Massive MIMO Vehicular Communications., and . IEEE Access, (2020)Integrating the Intelligent Driver Model With the Action Point Paradigm to Enhance the Performance of Autonomous Driving., , , and . IEEE Access, (2020)Singlet/triplet exciton dissociation and charge recombination in donor-acceptor ThQs-C60/PDIxCN2 complexes., , and . J. Comput. Chem., 40 (9): 997-1004 (2019)Impervious Surface Extraction by Linear Spectral Mixture Analysis with Post-Processing Model., , , , , and . IEEE Access, (2020)CellTrans: Private Car or Public Transportation? Infer Users' Main Transportation Modes at Urban Scale with Cellular Data., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (3): 125:1-125:26 (2019)A detection model of malicious Android applications based on Naive Bayes., , and . Int. J. Embed. Syst., 11 (4): 508-515 (2019)