Author of the publication

Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.

, , and . Comput. J., 62 (4): 631-640 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison on H∞ Filter and Kalman Filter for Initial Alignment of SINS on Static Base., and . AsiaSim (2), volume 324 of Communications in Computer and Information Science, page 194-201. Springer, (2012)Method for quickly inferring the mechanisms of large-scale complex networks based on the census of subgraph concentrations., and . J. Systems Science & Complexity, 22 (2): 252-259 (2009)Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing., and . Inf. Process. Lett., (2018)Control Performance Aware Cooperative Transmission in Multiloop Wireless Control Systems for Industrial IoT Applications., , , , , and . IEEE Internet of Things Journal, 5 (5): 3954-3966 (2018)A Simple Method to Build Oversampled Filter Banks and Tight Frames., and . IEEE Trans. Image Processing, 16 (11): 2682-2687 (2007)Distributed power control and random access for spectrum sharing with QoS constraint., , , , , and . Comput. Commun., 31 (17): 4089-4097 (2008)Medical entity recognition of Esophageal Carcinoma based on word clustering., , , , , and . SPAC, page 348-353. IEEE, (2018)Similarity search in sensor networks using semantic-based caching., and . J. Netw. Comput. Appl., 35 (2): 577-583 (2012)Mapping multiple applications with unbounded and bounded number of cores on many-core networks-on-chip., , , and . Microprocess. Microsystems, 37 (4-5): 460-471 (2013)Motion-towards-each-other-based hand gesture initialization., , , , , , and . Pattern Recognit., 48 (12): 4049-4056 (2015)