Author of the publication

Identity Based Proxy Re-encryption Scheme under LWE.

, , , , and . KSII Trans. Internet Inf. Syst., 11 (12): 6116-6132 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Energy Forecasting and Information Diffusion for Smart Power Grids, , , , , , , , , and 1 other author(s). IEEE International Scalable Computing Challenge (SCALE), page 1--4. (2012)SCALE Challenge Winner.Robust Position Control of Series Elastic Actuator with Backstepping Based on Disturbance Observer., , , , and . AIM, page 618-623. IEEE, (2019)Position Control of Flexible Joint Robots with PD Controller Based on Disturbance Observer., , , , and . ARSO, page 84-89. IEEE, (2019)Understanding of GP-Evolved Motion Detectors., , and . IEEE Comput. Intell. Mag., 8 (1): 46-55 (2013)Developer Identity Linkage and Behavior Mining Across GitHub and StackOverflow., , , and . International Journal of Software Engineering and Knowledge Engineering, 27 (9-10): 1409-1426 (2017)PDR/Geomagnetic Fusion Localization Method Based on AOFA-Improved Particle Filter., , and . IEEE Trans. Instrum. Meas., (2022)Undersampled CS image reconstruction using nonconvex nonsmooth mixed constraints., , , , , and . Multim. Tools Appl., 78 (10): 12749-12782 (2019)RoRED: Bootstrapping labeling rule discovery for robust relation extraction., , , and . Inf. Sci., (June 2023)An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation., , , , , and . IEEE Access, (2020)Toward data-driven demand-response optimization in a campus microgrid., , , , , and . BuildSys@SenSys, page 41-42. ACM, (2011)