Author of the publication

Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme.

, , , and . J. Inf. Hiding Multim. Signal Process., 4 (2): 110-118 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multigrid Backprojection Super-Resolution and Deep Filter Visualization., , and . AAAI, page 4642-4650. AAAI Press, (2019)Understanding Factors Influencing Users' Retweeting Behavior - A Theoretical Perspective., and . AMCIS, Association for Information Systems, (2013)Application specified soft error failure rate analysis using sequential equivalence checking techniques., , , and . ASP-DAC, page 608-613. IEEE, (2013)Fast non-convex low-rank matrix decomposition for separation of potential field data using minimal memory., , , and . CoRR, (2019)Object technology software selection: a case study., and . Ann. Oper. Res., 185 (1): 5-24 (2011)The effect of spinning missile on the position calculating of the reticle infrared detecting system., , , , and . EMEIT, page 1054-1057. IEEE, (2011)Spatial Dynamic Searchable Encryption with Forward Security., , , , and . DASFAA (2), volume 12113 of Lecture Notes in Computer Science, page 746-762. Springer, (2020)Intelligent Architectures for Knowledge Sharing: A Soar Example and General Issues., and . FLAIRS, page 318-320. AAAI Press, (2002)On Soft Error Immunity of Sequential Circuits., , and . Asian Test Symposium, page 106-110. IEEE Computer Society, (2010)An Approximate Soft Error Reliability Sorting Approach Based on State Analysis of Sequential Circuits., , and . DFT, page 209-217. IEEE Computer Society, (2010)