| Publication | Date of Publication | Type |
|---|
Distributed type-2 fuzzy adaptive control for heterogeneous nonlinear multiagent systems Asian Journal of Control | 2024-07-25 | Paper |
Enhanced extended state observer based prescribed time tracking control of wheeled mobile robot with slipping and skidding International Journal of Robust and Nonlinear Control | 2024-07-23 | Paper |
Fault frequency identification of rolling bearing using reinforced ensemble local mean decomposition Journal of Control Science and Engineering | 2022-03-25 | Paper |
A paid message forwarding scheme based on social network | 2021-12-08 | Paper |
Secure server-aided data sharing clique with attestation Information Sciences | 2021-04-19 | Paper |
Non-approximability and polylogarithmic approximations of the single-sink unsplittable and confluent dynamic flow problems | 2020-11-25 | Paper |
Multiple feature vectors based fault classification for WSN integrated bearing of rolling mill Journal of Control Science and Engineering | 2018-12-12 | Paper |
Batch blind signatures on elliptic curves | 2018-12-07 | Paper |
Efficient subtree-based encryption for fuzzy-entity data sharing Soft Computing | 2018-11-27 | Paper |
Linkable group signature for auditing anonymous communication | 2018-09-26 | Paper |
Auditable hierarchy-private public-key encryption | 2018-09-26 | Paper |
Bell-polynomial approach and Wronskian determinant solutions for three sets of differential-difference nonlinear evolution equations with symbolic computation ZAMP. Zeitschrift für angewandte Mathematik und Physik | 2018-01-19 | Paper |
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response IEEE Transactions on Computers | 2017-05-16 | Paper |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts IEEE Transactions on Computers | 2017-05-16 | Paper |
Vector-soliton bound states for the coupled mixed derivative nonlinear Schrödinger equations in optical fibers Wave Motion | 2017-05-15 | Paper |
Accelerating oblivious transfer with batch multi-exponentiation Information Security and Privacy | 2016-08-31 | Paper |
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts Information Sciences | 2016-07-11 | Paper |
Signatures in hierarchical certificateless cryptography: efficient constructions and provable security Information Sciences | 2016-07-08 | Paper |
On sketching quadratic forms Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science | 2016-04-15 | Paper |
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement Information Security and Cryptology | 2015-12-02 | Paper |
\(N\)-soliton solutions and asymptotic analysis for a Kadomtsev-Petviashvili-Schrödinger system for water waves ZAMP. Zeitschrift für angewandte Mathematik und Physik | 2015-11-24 | Paper |
Robust distributed privacy-preserving secure aggregation in vehicular communication | 2015-08-10 | Paper |
Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test Computer Security - ESORICS 2014 | 2015-07-27 | Paper |
Practical (fully) distributed signatures provably secure in the standard model Theoretical Computer Science | 2015-07-24 | Paper |
Bell-polynomial approach and N-soliton solution for the extended Lotka–Volterra equation in plasmas Journal of Mathematical Physics | 2015-07-17 | Paper |
Dark-soliton dynamics in a two-species Bose-Einstein condensate with the external potential and thermal cloud effects Journal of Mathematical Analysis and Applications | 2015-02-26 | Paper |
Hierarchical Identity-Based Broadcast Encryption Information Security and Privacy | 2014-07-24 | Paper |
Practical distributed signatures in the standard model Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Soliton interactions for a Hirota-Maxwell-Bloch system in the inhomogeneous erbium-doped fiber International Journal of Modern Physics B | 2013-11-12 | Paper |
Provably secure threshold public-key encryption with adaptive security and short ciphertexts Information Sciences | 2012-10-25 | Paper |
Soliton interactions in a generalized inhomogeneous coupled Hirota-Maxwell-Bloch system Nonlinear Dynamics | 2012-07-17 | Paper |
Bäcklund transformation, superposition formulae and \(N\)-soliton solutions for the perturbed Korteweg-de Vries equation Communications in Nonlinear Science and Numerical Simulation | 2012-07-16 | Paper |
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol Information Sciences | 2012-07-13 | Paper |
Bridging broadcast encryption and group key agreement Lecture Notes in Computer Science | 2011-12-02 | Paper |
Solitonic Excitations and Interactions in the Three-Spine $\alpha$-Helical Protein with Inhomogeneity SIAM Journal on Applied Mathematics | 2011-11-10 | Paper |
Fully distributed broadcast encryption Provable Security | 2011-09-16 | Paper |
Bäcklund Transformation and Multisoliton Solutions in Terms of Wronskian Determinant for (2+1)-Dimensional Breaking Soliton Equations with Symbolic Computation Communications in Theoretical Physics | 2011-06-30 | Paper |
Solitonic excitations and interactions in an \(\alpha\)-helical protein modeled by three coupled nonlinear Schrödinger equations with variable coefficients Journal of Physics A: Mathematical and Theoretical | 2011-01-07 | Paper |
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts Information and Communications Security | 2010-12-17 | Paper |
Efficient many-to-one authentication with certificateless aggregate signatures Computer Networks | 2010-11-25 | Paper |
Identity-based authenticated asymmetric group key agreement protocol Lecture Notes in Computer Science | 2010-07-20 | Paper |
Novel efficient certificateless aggregate signatures Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2010-01-14 | Paper |
Identity-based verifiably encrypted signatures without random oracles Provable Security | 2009-12-11 | Paper |
Fast detection of vehicles based on the moving region Journal of Computer Applications | 2009-11-09 | Paper |
Asymmetric Group Key Agreement Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Publicly Verifiable Privacy-Preserving Group Decryption Information Security and Cryptology | 2009-04-29 | Paper |
Privacy for Private Key in Signatures Information Security and Cryptology | 2009-04-29 | Paper |
Large extra dimension and dark matter detection | 2009-01-15 | Paper |
A key argument scheme for mobile ad hoc networks based on password authentification | 2007-02-12 | Paper |
Information Security Practice and Experience Lecture Notes in Computer Science | 2005-09-13 | Paper |
scientific article; zbMATH DE number 2112355 (Why is no real title available?) | 2004-10-28 | Paper |
C\(^1\)-smoothing of multipatch Bezier surfaces Journal of Ocean University of Qingdao | 2001-08-06 | Paper |