Author of the publication

An Anonymous but Accountable Proxy Multi-signature Scheme.

, and . J. Softw., 8 (8): 1867-1874 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ten scientific problems in human behavior understanding., , , , and . CCF Trans. Pervasive Comput. Interact., 1 (1): 3-9 (2019)Recognition of Group Mobility Level and Group Structure with Mobile Devices., , , , , and . IEEE Trans. Mob. Comput., 17 (4): 884-897 (2018)GroupShop: monitoring group shopping behavior in real world using mobile devices., , , , and . J. Ambient Intell. Humaniz. Comput., 14 (5): 6367-6378 (2023)Cyber-physical-social collaborative sensing: from single space to cross-space., , , , and . Frontiers Comput. Sci., 12 (4): 609-622 (2018)Scope-aware data cache analysis for OpenMP programs on multi-core processors., , , and . J. Syst. Archit., (2019)eXtensible Markup Language access control model with filtering privacy based on matrix storage., , , and . IET Commun., 8 (11): 1919-1927 (2014)Key Sharing in Hierarchical Wireless Sensor Networks., , , and . EUC, page 743-748. IEEE Computer Society, (2010)Real-Time Scheduling and Analysis of OpenMP Programs with Spin Locks., , , , and . ICPADS, page 99-108. IEEE, (2020)Sensing keyboard input for computer activity recognition with a smartphone., , , , , and . UbiComp/ISWC Adjunct, page 25-28. ACM, (2017)On the Analysis of Parallel Real-Time Tasks with Spin Locks., , , , and . CoRR, (2020)