Author of the publication

An efficient quantum blind digital signature scheme.

, , , , , and . Sci. China Inf. Sci., 60 (8): 082501:1-082501:14 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment, , , and . CoRR, (2013)Investigating the co-evolution of node reputation and edge-strategy in prisoner's dilemma game., , , , , and . Appl. Math. Comput., (2020)Dimension-reduced spatiotemporal network for lameness detection in dairy cows., , , and . Comput. Electron. Agric., (2022)FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment., , , , , and . IEEE Access, (2020)REMSF: A Robust Ensemble Model of Malware Detection Based on Semantic Feature Fusion., , , , , and . IEEE Internet Things J., 10 (18): 16134-16143 (September 2023)A weighted network community detection algorithm based on deep learning., , , , , and . Appl. Math. Comput., (2021)Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning., , , , and . IEEE Trans. Intell. Transp. Syst., 24 (7): 7642-7652 (2023)A Review of Provenance Graph based APT Attack Detection: Applications and Developments., , , , , and . DSC, page 498-505. IEEE, (2022)A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match., , , , and . DSC, page 480-486. IEEE, (2019)Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks., , , , , and . DependSys, volume 1123 of Communications in Computer and Information Science, page 446-453. Springer, (2019)