Bo Qin

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Distributed type-2 fuzzy adaptive control for heterogeneous nonlinear multiagent systems
Asian Journal of Control
2024-07-25Paper
Enhanced extended state observer based prescribed time tracking control of wheeled mobile robot with slipping and skidding
International Journal of Robust and Nonlinear Control
2024-07-23Paper
Fault frequency identification of rolling bearing using reinforced ensemble local mean decomposition
Journal of Control Science and Engineering
2022-03-25Paper
A paid message forwarding scheme based on social network
 
2021-12-08Paper
Secure server-aided data sharing clique with attestation
Information Sciences
2021-04-19Paper
Non-approximability and polylogarithmic approximations of the single-sink unsplittable and confluent dynamic flow problems
 
2020-11-25Paper
Multiple feature vectors based fault classification for WSN integrated bearing of rolling mill
Journal of Control Science and Engineering
2018-12-12Paper
Batch blind signatures on elliptic curves
 
2018-12-07Paper
Efficient subtree-based encryption for fuzzy-entity data sharing
Soft Computing
2018-11-27Paper
Linkable group signature for auditing anonymous communication
 
2018-09-26Paper
Auditable hierarchy-private public-key encryption
 
2018-09-26Paper
Bell-polynomial approach and Wronskian determinant solutions for three sets of differential-difference nonlinear evolution equations with symbolic computation
ZAMP. Zeitschrift für angewandte Mathematik und Physik
2018-01-19Paper
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response
IEEE Transactions on Computers
2017-05-16Paper
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
IEEE Transactions on Computers
2017-05-16Paper
Vector-soliton bound states for the coupled mixed derivative nonlinear Schrödinger equations in optical fibers
Wave Motion
2017-05-15Paper
Accelerating oblivious transfer with batch multi-exponentiation
Information Security and Privacy
2016-08-31Paper
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
Information Sciences
2016-07-11Paper
Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
Information Sciences
2016-07-08Paper
On sketching quadratic forms
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement
Information Security and Cryptology
2015-12-02Paper
\(N\)-soliton solutions and asymptotic analysis for a Kadomtsev-Petviashvili-Schrödinger system for water waves
ZAMP. Zeitschrift für angewandte Mathematik und Physik
2015-11-24Paper
Robust distributed privacy-preserving secure aggregation in vehicular communication
 
2015-08-10Paper
Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test
Computer Security - ESORICS 2014
2015-07-27Paper
Practical (fully) distributed signatures provably secure in the standard model
Theoretical Computer Science
2015-07-24Paper
Bell-polynomial approach and N-soliton solution for the extended Lotka–Volterra equation in plasmas
Journal of Mathematical Physics
2015-07-17Paper
Dark-soliton dynamics in a two-species Bose-Einstein condensate with the external potential and thermal cloud effects
Journal of Mathematical Analysis and Applications
2015-02-26Paper
Hierarchical Identity-Based Broadcast Encryption
Information Security and Privacy
2014-07-24Paper
Practical distributed signatures in the standard model
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Soliton interactions for a Hirota-Maxwell-Bloch system in the inhomogeneous erbium-doped fiber
International Journal of Modern Physics B
2013-11-12Paper
Provably secure threshold public-key encryption with adaptive security and short ciphertexts
Information Sciences
2012-10-25Paper
Soliton interactions in a generalized inhomogeneous coupled Hirota-Maxwell-Bloch system
Nonlinear Dynamics
2012-07-17Paper
Bäcklund transformation, superposition formulae and \(N\)-soliton solutions for the perturbed Korteweg-de Vries equation
Communications in Nonlinear Science and Numerical Simulation
2012-07-16Paper
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Information Sciences
2012-07-13Paper
Bridging broadcast encryption and group key agreement
Lecture Notes in Computer Science
2011-12-02Paper
Solitonic Excitations and Interactions in the Three-Spine $\alpha$-Helical Protein with Inhomogeneity
SIAM Journal on Applied Mathematics
2011-11-10Paper
Fully distributed broadcast encryption
Provable Security
2011-09-16Paper
Bäcklund Transformation and Multisoliton Solutions in Terms of Wronskian Determinant for (2+1)-Dimensional Breaking Soliton Equations with Symbolic Computation
Communications in Theoretical Physics
2011-06-30Paper
Solitonic excitations and interactions in an \(\alpha\)-helical protein modeled by three coupled nonlinear Schrödinger equations with variable coefficients
Journal of Physics A: Mathematical and Theoretical
2011-01-07Paper
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Information and Communications Security
2010-12-17Paper
Efficient many-to-one authentication with certificateless aggregate signatures
Computer Networks
2010-11-25Paper
Identity-based authenticated asymmetric group key agreement protocol
Lecture Notes in Computer Science
2010-07-20Paper
Novel efficient certificateless aggregate signatures
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2010-01-14Paper
Identity-based verifiably encrypted signatures without random oracles
Provable Security
2009-12-11Paper
Fast detection of vehicles based on the moving region
Journal of Computer Applications
2009-11-09Paper
Asymmetric Group Key Agreement
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Publicly Verifiable Privacy-Preserving Group Decryption
Information Security and Cryptology
2009-04-29Paper
Privacy for Private Key in Signatures
Information Security and Cryptology
2009-04-29Paper
Large extra dimension and dark matter detection
 
2009-01-15Paper
A key argument scheme for mobile ad hoc networks based on password authentification
 
2007-02-12Paper
Information Security Practice and Experience
Lecture Notes in Computer Science
2005-09-13Paper
scientific article; zbMATH DE number 2112355 (Why is no real title available?)
 
2004-10-28Paper
C\(^1\)-smoothing of multipatch Bezier surfaces
Journal of Ocean University of Qingdao
2001-08-06Paper


Research outcomes over time


This page was built for person: Bo Qin