Author of the publication

A Threshold Multi-server Protocol for Password-Based Authentication.

, , and . CSCloud, page 108-118. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TMS: A Scalable Transition Multicast Scheme., , , and . IWDC, volume 2918 of Lecture Notes in Computer Science, page 80-90. Springer, (2003)Reinforcement Learning to Diversify Top-N Recommendation., , , , , and . DASFAA (2), volume 11447 of Lecture Notes in Computer Science, page 104-120. Springer, (2019)Precise asymptotics for the first moment of the error variance estimator in linear models., , and . Appl. Math. Lett., 21 (6): 641-647 (2008)An Evaluation Dataset Construction Approach for Task-Oriented Dialogue., , , , , and . IC-NIDC, page 314-318. IEEE, (2021)Super-Resolution Information Enhancement for Crowd Counting., , , , , , , and . ICASSP, page 1-5. IEEE, (2023)Label-Attentive Hierarchical Attention Network for Text Classification., , and . ICBDC, page 90-96. ACM, (2020)Multi-degree Valence Relation Based Topical Matching Model in Patent Trading., , and . ATCI, volume 1244 of Advances in Intelligent Systems and Computing, page 825-831. Springer, (2020)Innovation Hierarchy Based Patent Representation Model., and . IJCNN, page 1-8. IEEE, (2022)Cognition-Based Semantic Annotation for Web Images., , , and . BDCloud, page 540-546. IEEE Computer Society, (2014)An Efficient Recovery and Survival Scheme against Malware Attacks., , , , and . ICC, page 1-5. IEEE, (2010)