Author of the publication

Efficienct ID-Based Proxy Blind Signature Schemes from Pairings.

, , and . CIS (1), page 390-393. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Public Key Certificate Revocation Scheme Based on One-Way Hash Chain., , , and . WAIM, volume 3739 of Lecture Notes in Computer Science, page 670-675. Springer, (2005)Decentralized Access Control Encryption in Public Blockchain., , , and . BlockSys, volume 1156 of Communications in Computer and Information Science, page 240-257. Springer, (2019)Highly Efficient and Stable Perovskite Solar Cells Using a Dopant‐Free Inexpensive Small Molecule as the Hole‐Transporting Material, , , , , , and . Advanced Energy Materials, (June 2018)A secure short message communication protocol., , and . Int. J. Autom. Comput., 5 (2): 202-207 (2008)Cloud Removal for Remote Sensing Imagery via Spatial Attention Generative Adversarial Network.. CoRR, (2020)All-inkjet-printed flexible electronics fabrication on a polymer substrate by low-temperature high-resolution selective laser sintering of metal nanoparticles, , , , , and . Nanotechnology, 18 (34): 345202 (2007)Efficienct ID-Based Proxy Blind Signature Schemes from Pairings., , and . CIS (1), page 390-393. IEEE Computer Society, (2008)Digital Twin Assisted Task Offloading for Aerial Edge Computing and Networks., , , , and . CoRR, (2022)Edge-Cloud Collaborated Object Detection via Difficult-Case Discriminator., , , , , and . CoRR, (2021)Accelerating LSH-based Distributed Search with In-network Computation., , , , , , and . INFOCOM, page 1-10. IEEE, (2021)