Author of the publication

Non-malleable Statistically Hiding Commitment from Any One-Way Function.

, , , and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 303-318. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT., , , , , , and . IEEE Trans. Ind. Informatics, 16 (6): 4231-4241 (2020)The Impacts of Online Clothes Short Video Display on Consumers' Perceived Quality., , , and . Information, 11 (2): 87 (2020)Theoretical Foundations of t-SNE for Visualizing High-Dimensional Clustered Data., and . J. Mach. Learn. Res., (2022)Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials., , , , and . J. Cloud Comput., 13 (1): 30 (December 2024)Matrix Reordering for Noisy Disordered Matrices: Optimality and Computationally Efficient Algorithms., and . IEEE Trans. Inf. Theory, 70 (1): 509-531 (January 2024)Classification of Benign and Malignant Pulmonary Nodules Based on the Multiresolution 3D DPSECN Model and Semisupervised Clustering., , , , and . IEEE Access, (2021)WUSL-SOD: Joint weakly supervised, unsupervised and supervised learning for salient object detection., , , , , , and . Neural Comput. Appl., 35 (21): 15837-15856 (July 2023)Edge Server Placement for Service Offloading in Internet of Things.. Secur. Commun. Networks, (2021)Distance Measure of Hesitant Fuzzy Sets and its Application in Image Segmentation., , , , and . Int. J. Fuzzy Syst., 24 (7): 3134-3143 (2022)Blockchain-enabled Secure Distributed Data Aggregation and Verification Mechanism for IIoT., , , and . GLOBECOM, page 4383-4388. IEEE, (2022)