Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Abnormal Traffic Detection: Traffic Feature Extraction and DAE-GAN With Efficient Data Augmentation., , , , , and . IEEE Trans. Reliab., 72 (2): 498-510 (2023)Towards Trustworthy DeFi Oracles: Past, Present and Future., , , , and . CoRR, (2022)An Overview of Trust Standards for Communication Networks and Future Digital World., , , , , and . IEEE Access, (2023)Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries., and . Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, page 172-183. Springer, (2005)Conditional Oblivious Cast., and . Public Key Cryptography, volume 3958 of Lecture Notes in Computer Science, page 443-457. Springer, (2006)Conditional proxy re-encryption secure against chosen-ciphertext attack., , , , and . AsiaCCS, page 322-332. ACM, (2009)Keyed Non-parametric Hypothesis Tests., , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 632-645. Springer, (2019)Identity-Based Proxy Re-encryption Without Random Oracles., and . ISC, volume 4779 of Lecture Notes in Computer Science, page 189-202. Springer, (2007)Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes., and . J. Inf. Sci. Eng., 25 (5): 1465-1483 (2009)Efficient k-out-of-n Oblivious Transfer Schemes., and . J. Univers. Comput. Sci., 14 (3): 397-415 (2008)