Author of the publication

Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.

, , , , , , and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 348-359. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Matador: An Exploration Environment for System-Design., , , , , and . Journal of Circuits, Systems, and Computers, 11 (5): 503-536 (2002)TCP Congestion Avoidance Algorithm Identification., , , , , and . IEEE/ACM Trans. Netw., 22 (4): 1311-1324 (2014)Three-Dimensional Drone-Cell Deployment for Congestion Mitigation in Cellular Networks., , , , and . IEEE Trans. Vehicular Technology, 67 (10): 9867-9881 (2018)Efficient and Fair Network Selection for Integrated Cellular and Drone-Cell Networks., , , , and . IEEE Trans. Vehicular Technology, 68 (1): 923-937 (2019)Decentralized estimation and control of graph connectivity for mobile sensor networks., , , , , and . Autom., 46 (2): 390-396 (2010)Tag2Vec: Tag Embedding for Top-N Recommendation., , , and . ICNC-FSKD, volume 1075 of Advances in Intelligent Systems and Computing, page 168-175. Springer, (2019)BioEditor - Simplifying Macromolecular Structure Annotation., , , and . Bioinform., 19 (7): 897-898 (2003)基于标签信息特征相似性的协同过滤个性化推荐 (Collaborative Filtering Personalized Recommendation Based on Similarity of Tag Information Feature)., , , and . 计算机科学, 45 (6A): 415-422 (2018)Relations Among Notions of Security for Identity Based Encryption Schemes., , , , , , and . IACR Cryptology ePrint Archive, (2005)Predictive Control of Nonlinear System Based on MPSO-RBF Neural Network., , , and . ISIA, volume 86 of Communications in Computer and Information Science, page 567-573. Springer, (2010)