Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud., , , and . IEEE Access, (2019)A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus., , , , and . ICCSA (2), volume 5073 of Lecture Notes in Computer Science, page 1-13. Springer, (2008)Breaking a New Instance of TTM Cryptosystems., , , , and . ACNS, volume 3989 of Lecture Notes in Computer Science, page 210-225. (2006)Analysis of Second Order Matrices Construction in MFE Public Key Cryptosystem., , , and . Int. J. Netw. Secur., 18 (1): 158-164 (2016)The Trust Management Model of Trusted Software., , , and . IFITA (3), page 534-537. IEEE Computer Society, (2009)Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme., , , , and . PQCrypto, volume 6061 of Lecture Notes in Computer Science, page 41-60. Springer, (2010)Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things., , , and . IEEE Trans. Ind. Informatics, 16 (2): 1013-1023 (2020)A Dynamic Bidding Strategy Based on Model-Free Reinforcement Learning in Display Advertising., , , , and . IEEE Access, (2020)Cryptanalysis of Two New Instances of TTM Cryptosystem., , , and . IACR Cryptology ePrint Archive, (2007)Role-Based ABAC Model for Implementing Least Privileges., , , , , and . ICSCA, page 467-471. ACM, (2019)