Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provably secure multi-proxy signature scheme with revocation in the standard model., , , and . Comput. Commun., 34 (3): 494-501 (2011)Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain., , and . FCS, volume 1726 of Communications in Computer and Information Science, page 211-225. Springer, (2022)Constant-size ring signature scheme using multilinear maps., , , and . Int. J. Embed. Syst., 12 (2): 206-215 (2020)The changing rule of human bone density with aging based on a novel definition and mensuration of bone density with computed tomography., , , , , , , and . CoRR, (2023)Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update., and . KSII Trans. Internet Inf. Syst., 11 (5): 2792-2810 (2017)A non-interior-point smoothing method for variational inequality problem., , and . J. Comput. Appl. Math., 234 (3): 713-721 (2010)A trust region SQP-filter method for nonlinear second-order cone programming., , and . Comput. Math. Appl., 63 (12): 1569-1576 (2012)Synthetic CT Generation via Variant Invertible Network for All-digital Brain PET Attenuation Correction., , , , , and . CoRR, (2023)PET Tracer Conversion among Brain PET via Variable Augmented Invertible Network., , , , , , , , , and 1 other author(s). CoRR, (2023)Certificateless signcryption scheme in the standard model., , , and . Inf. Sci., 180 (3): 452-464 (2010)