Author of the publication

Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.

, , , , and . J. Commun., 3 (7): 36-43 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Integrity Auditing without Private Key Storage for Secure Cloud Storage., , , , , and . IEEE Trans. Cloud Comput., 9 (4): 1408-1421 (2021)Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things., , , and . IEEE Internet Things J., 9 (11): 8737-8748 (2022)Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT., , , and . IEEE Internet Things J., 9 (16): 15138-15149 (2022)Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing., , , , , and . IEEE Access, (2018)Connectivity and constructive algorithms of disjoint paths in dragonfly networks., , , , and . Theor. Comput. Sci., (2022)Component conditional fault tolerance of hierarchical folded cubic networks., , , , and . Theor. Comput. Sci., (2021)Enhancing fault tolerance of balanced hypercube networks by the edge partition method., , , , and . Theor. Comput. Sci., (February 2024)TDFL: Truth Discovery Based Byzantine Robust Federated Learning., , , , , and . IEEE Trans. Parallel Distributed Syst., 33 (12): 4835-4848 (2022)PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing., , , , and . IEEE Syst. J., 15 (3): 3730-3739 (2021)Conserving network processor power consumption by exploiting traffic variability., , , and . ACM Trans. Archit. Code Optim., 4 (1): 4 (2007)