Author of the publication

Pairing-based public-key encryption schemes with backward-and-forward security.

, , and . Comput. Syst. Sci. Eng., (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <0.5MB model size, , , , , and . (2016)cite arxiv:1602.07360Comment: In ICLR Format.Advancing the State of the Art in Open Domain Dialog Systems through the Alexa Prize., , , , , , , , , and 12 other author(s). CoRR, (2018)Energy Efficient On-Demand Dynamic Branch Prediction Models., , , , , and . IEEE Trans. Computers, 69 (3): 453-465 (2020)Angel-Eye: A Complete Design Flow for Mapping CNN Onto Embedded FPGA., , , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 37 (1): 35-47 (2018)Learning both Weights and Connections for Efficient Neural Networks., , , and . CoRR, (2015)Domain-specific hardware accelerators., , and . Commun. ACM, 63 (7): 48-57 (2020)SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <1MB model size., , , , , and . CoRR, (2016)A Double Disturbance Observer Design for Compensation of Unknown Time Delay in a Wireless Motion Control System., , , , , , and . IEEE Trans. Control. Syst. Technol., 26 (2): 675-683 (2018)Energy Efficient Residual Energy Monitoring in Wireless Sensor Networks., and . Int. J. Distributed Sens. Networks, 5 (6): 748-770 (2009)Relay Selection for Underwater Acoustic Sensor Networks: A Multi-User Multi-Armed Bandit Formulation., , , , and . IEEE Access, (2018)