Author of the publication

New CCA-Secure Proxy Re-encryption Scheme without Random Oracles.

, , and . CIS, page 377-381. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificateless Multi-signcryption Scheme in Standard Model., , and . INCoS, page 475-479. IEEE, (2016)Generative Steganography Based on GANs., , , and . ICCCS (6), volume 11068 of Lecture Notes in Computer Science, page 537-549. Springer, (2018)New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication., , , and . Mob. Inf. Syst., (2015)Novel Iterative Attention Focusing Strategy for Joint Pathology Localization and Prediction of MCI Progression., , , , , , , , , and 1 other author(s). MICCAI (4), volume 11767 of Lecture Notes in Computer Science, page 307-315. Springer, (2019)Audio Digital Signature Algorithm with Tamper Detection., , and . IAS, page 15-18. IEEE Computer Society, (2009)Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption., , , and . INCoS, page 438-442. IEEE, (2013)Regression-Based Line Detection Network for Delineation of Largely Deformed Brain Midline., , , , , , , , , and . MICCAI (3), volume 11766 of Lecture Notes in Computer Science, page 839-847. Springer, (2019)Progressive reversible data hiding in encrypted images based on polynomial secret sharing and Chinese remainder theorem., , , , and . J. Electronic Imaging, (2024)VisionFM: a Multi-Modal Multi-Task Vision Foundation Model for Generalist Ophthalmic Artificial Intelligence., , , , , , , , , and 32 other author(s). CoRR, (2023)Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme., , , and . J. Syst. Softw., 84 (2): 219-225 (2011)