Author of the publication

Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation.

, , , , , , and . IACR Cryptol. ePrint Arch., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Degradation-based maintenance decision using stochastic filtering for systems under imperfect maintenance., , and . Eur. J. Oper. Res., 245 (2): 531-541 (2015)Minutiae and modified Biocode fusion for fingerprint-based key generation., , , , and . J. Netw. Comput. Appl., 33 (3): 221-235 (2010)Adaptive residual CNN-based fault detection and diagnosis system of small modular reactors., , and . Appl. Soft Comput., (2022)Cellular Network Radio Monitoring and Management through Virtual UE Probes: A Study Case Based on Crowded Events., , , , , and . Sensors, 21 (10): 3404 (2021)Efficient polarization beam splitter based on the optimized stationary light pulse., , , , , , , , and . Quantum Inf. Process., 20 (3): 115 (2021)On Bayesian software reliability modelling, and . Journal of Statistical Planning and Inference, 29 (1-2): 33--41 (00 1992)Breaking out of the box of recommendations: from items to packages., , and . RecSys, page 151-158. ACM, (2010)Hypersphere dominance: an optimal approach., , , and . SIGMOD Conference, page 111-122. ACM, (2014)A simple goodness-of-fit test for the power-law process, based on the Duane plot., , and . IEEE Trans. Reliability, 52 (1): 69-74 (2003)High Performance Interconnect Network for Tianhe System., , , , , , , and . J. Comput. Sci. Technol., 30 (2): 259-272 (2015)