Author of the publication

CCA2 secure public-key encryption scheme tolerating continual leakage attacks.

, , , and . Secur. Commun. Networks, 9 (17): 4505-4519 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible neural trees ensemble for stock index modeling, , and . Neurocomputing, 70 (4-6): 697--703 (January 2007)Advanced Neurocomputing Theory and Methodology - Selected papers from the International Conference on Intelligent Computing 2005 (ICIC 2005), International Conference on Intelligent Computing 2005.Visualization of the Chinese academic web based on social network analysis., , and . J. Inf. Sci., 36 (2): 131-143 (2010)An Adaptive CU Depth Selection Mechanism Based on Visual Sensitivity for HEVC Inter Coding., , , , and . VTC Spring, page 1-5. IEEE, (2014)An Improved Distributed Video Coding Scheme for Wireless Video Sensor Network., , , , and . VTC Fall, page 1-4. IEEE, (2011)Energy Efficiency Design for Generator Slot Wedge Inspection based on Compressive Sensing., , , and . ICCA, page 1095-1100. IEEE, (2018)Pricing-based resource allocation with security requirements for OFDM networks in real-time electricity market., , , and . ASCC, page 1-6. IEEE, (2013)Improving gene expression programming using diversity preservation tournament and its application in grid cell modeling., , , and . SMC, page 424-429. IEEE, (2016)No-reference image quality assessment based on phase congruency and spectral entropies., , , , , and . PCS, page 302-306. IEEE, (2015)Feedback-free distributed video coding using parallelized design., , , , and . PCS, page 217-220. IEEE, (2012)Random Access in Wireless Ad Hoc Networks for Throughput Maximization., , and . ICARCV, page 1-6. IEEE, (2006)