Author of the publication

An Identity Based Proxy Signature Scheme Secure in the Standard Model.

, and . GrC, page 67-72. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BER Analysis of Physical-Layer Network Coding in the AWGN Channel With Burst Pulses., , , and . IEEE Access, (2016)Parity-Check Coding Transmit Diversity for Wireless Communications With High Mobility., , , and . IEEE Trans. Veh. Technol., 71 (2): 1737-1749 (2022)Learning by Experimentation in a Robot World., and . SCAI, volume 4 of Frontiers in Artificial Intelligence and Applications, page 177-184. IOS Press, (1989)Discrete differential evolution algorithm for distributed blocking flowshop scheduling with makespan criterion., , and . Eng. Appl. Artif. Intell., (2018)Adaptive Fuzzy Inverse Optimal Control for A Class of Two Order Nonlinear Systems., , , and . SPAC, page 268-272. IEEE, (2018)Biased Bit Commitment and Applications., , , , and . J. Inf. Sci. Eng., 24 (2): 441-452 (2008)Semantic Enhancement for Enterprise Data Management., , , , , , , and . ISWC, volume 5823 of Lecture Notes in Computer Science, page 876-892. Springer, (2009)MeDetect: Domain Entity Annotation in Biomedical References Using Linked Open Data., , , , , , and . ISWC (Posters & Demos), volume 914 of CEUR Workshop Proceedings, CEUR-WS.org, (2012)A Comparative Study of Classification Algorithms: Statistical, Machine Learning and Neural Network., , , and . Machine Intelligence 13, page 311-359. Clarendon Press, Oxford, (1992)Intelligent Insect-Computer Hybrid Robot: Installing Innate Obstacle Negotiation and Onboard Human Detection onto Cyborg Insect., , , , , , , , , and 2 other author(s). Adv. Intell. Syst., (May 2023)