Author of the publication

Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme.

, , , and . ICCNS, page 12-16. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme., , , and . ICCNS, page 12-16. ACM, (2018)Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme., , , and . CISP-BMEI, page 1-9. IEEE, (2018)Intrusion Detection Method Based On Improved Conditional Generative Adversarial Network., and . AIIPCC, page 37-40. IEEE, (2022)Cryptography Teaching Based on Problem Oriented: Take the Knowledge Point of Designated Verifier Signature as an Example., , , , and . ICEBT, page 73-77. ACM, (2018)Research on Human Fall Detection Based on Tiny-yolov3 Algorithm., and . EITCE, page 1326-1330. ACM, (2021)Approach for Name Ambiguity Problem Using a Multiple-Layer Clustering., , , , and . CSE (4), page 874-878. IEEE Computer Society, (2009)App Tamper Detection and Retrospective Program Research.. CSoNet, volume 11280 of Lecture Notes in Computer Science, page 318-329. Springer, (2018)改进的无证书广义指定验证者聚合签名方案 (Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier)., , , , , and . 计算机科学, 44 (8): 168-175 (2017)OEA_SAT: An Organizational Evolutionary Algorithm for solving SATisfiability problems., , , and . IEEE Congress on Evolutionary Computation, page 765-770. IEEE, (2009)Research on Collaboration Software Based on JBPM and Lightweight J2EE Framework., , and . ICEE, page 191-194. IEEE Computer Society, (2010)