Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proxy multi-signature binding positioning protocol., , and . ICCC, page 166-170. IEEE, (2014)On the Symmetric Central Configurations for the Planar 1 + 4-Body Problem., , and . Complex., (2019)Optimal Representation for Web and Social Network Graphs Based on K² -Tree., , , and . IEEE Access, (2019)Degradation State Partition and Compound Fault Diagnosis of Rolling Bearing Based on Personalized Multilabel Learning., , , , and . IEEE Trans. Instrum. Meas., (2021)Verification of Branch-Time Property Based on Dynamic Description Logic., , , and . Intelligent Information Processing, volume 432 of IFIP Advances in Information and Communication Technology, page 161-170. Springer, (2014)Some basic principles for proxy signature schemes based on ECDLP., , and . CollaborateCom, page 1-5. ICST / IEEE, (2010)A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme., , , and . CollaborateCom, volume 10 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 416-424. Springer / ICST, (2008)A Security Detection Model for Selfish Mining Attack., , , and . BlockSys, volume 1156 of Communications in Computer and Information Science, page 185-195. Springer, (2019)Multi-proxy multi-signature binding positioning protocol., , , , and . Secur. Commun. Networks, 9 (16): 3868-3879 (2016)Chinese Gini Coefficient from 2005 to 2012, Based on 20 Grouped Income Data Sets of Urban and Rural Residents., , , , , and . J. Appl. Math., (2015)