Author of the publication

Efficient identity-based signature over NTRU lattice.

, , , and . Frontiers Inf. Technol. Electron. Eng., 17 (2): 135-142 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient identity-based signature over NTRU lattice., , , and . Frontiers Inf. Technol. Electron. Eng., 17 (2): 135-142 (2016)Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s)., , , and . J. Inf. Secur. Appl., (2019)End-To-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach., , , , and . Ad Hoc Sens. Wirel. Networks, 29 (1-4): 265-285 (2015)Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing., , , , , , and . J. Cloud Comput., 12 (1): 174 (December 2023)An Adaptive Traffic Signal Control Scheme Based on Back-pressure with Global Information., , , , and . J. Inf. Process., (2021)Optimized byzantine fault tolerant algorithm for improving performance and security with trust values., , , and . IET Blockchain, 4 (1): 1-17 (March 2024)AES-128 under HHL algorithm., , , and . Quantum Inf. Comput., 22 (3&4): 209-240 (2022)Source delay in mobile ad hoc networks., , , and . Ad Hoc Networks, (2015)Leakage-Suppressed Range Query Scheme for Structured Data in IoT., , , and . IEEE Syst. J., 16 (3): 3531-3542 (2022)Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption., , , and . IEEE Syst. J., 15 (4): 5233-5244 (2021)