Author of the publication

A Certificateless Noninteractive Key Exchange Protocol with Provable Security.

, , , and . Secur. Commun. Networks, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combination of Multiple Features in Support Vector Machine with Principal Component Analysis in Application for Alzheimer's Disease Diagnosis., , , , , , and . ICONIP (2), volume 5864 of Lecture Notes in Computer Science, page 512-519. Springer, (2009)A Robust Queueing Network Analyzer Based on Indices of Dispersion., and . CoRR, (2020)BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation., , , , , and . Proc. ACM Program. Lang., 3 (OOPSLA): 137:1-137:31 (2019)The advantage of indices of dispersion in queueing approximations., and . Oper. Res. Lett., 47 (2): 99-104 (2019)Spatio-Temporal Evaluation of Water Storage Trends from Hydrological Models over Australia Using GRACE Mascon Solutions., , , , , , and . Remote. Sens., 12 (21): 3578 (2020)New decomposition approximations for queueing networks., and . Queueing Syst. Theory Appl., 100 (3-4): 365-367 (2022)Raptor Encoding for Low-Latency Concurrent Multi-PDU Session Transmission with Security Consideration in B5G Edge Network., , , , , , and . CoRR, (2024)Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Heavy-traffic limits for stationary network flows., and . Queueing Syst. Theory Appl., 95 (1): 53-68 (2020)A New Hybrid Level Set Approach., , , and . IEEE Trans. Image Process., (2020)