Author of the publication

Evolutionary game analysis of inter-organizational trust and technology sharing behavior in enterprise collaborative innovation.

, , , and . J. Intell. Fuzzy Syst., 45 (4): 5723-5738 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constant Size Ciphertext and Private Key HIBE without Random Oracles., , , and . J. Inf. Sci. Eng., 30 (2): 333-345 (2014)An improved efficient identity-based proxy signature in the standard model., , , , and . Int. J. Comput. Math., 94 (1): 22-38 (2017)基于自适应遗传算法和多条带策略的排样方法研究 (Research of Packing Method Based on Adaptive Genetic Algorithm and Multi-strip Strategy)., , and . 计算机科学, 43 (4): 274-278 (2016)Density-Based Probabilistic Clustering of Uncertain Data., and . CSSE (4), page 474-477. IEEE Computer Society, (2008)978-0-7695-3336-0.Short Hierarchical Identity-based Encryption in the Selective-ID Model., , , , and . J. Softw., 8 (7): 1613-1619 (2013)改进的无证书广义指定验证者聚合签名方案 (Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier)., , , , , and . 计算机科学, 44 (8): 168-175 (2017)A generic construction of identity-based proxy signature scheme in the standard model., , , , and . Int. J. Inf. Comput. Secur., 11 (1): 83-100 (2019)基于轨迹多特性的隐私保护算法 (Privacy Protection Algorithm Based on Multi-characteristics of Trajectory)., , and . 计算机科学, 46 (1): 190-195 (2019)An undeniable strong DSVS scheme with no bilinear pairings., , , , and . CISP-BMEI, page 1944-1948. IEEE, (2016)Short and provably secure designated verifier proxy signature scheme., , , and . IET Inf. Secur., 10 (2): 69-79 (2016)