| Publication | Date of Publication | Type |
|---|
Public key encryption with temporary and fuzzy keyword search Mathematical Biosciences and Engineering | 2022-08-03 | Paper |
Insuring against the perils in distributed learning: privacy-preserving empirical risk minimization Mathematical Biosciences and Engineering | 2021-09-13 | Paper |
| Ciphertext sharing scheme for the public cloud | 2020-01-22 | Paper |
Comments on: ``A secure anti-collusion data sharing scheme for dynamic groups in the cloud Information Processing Letters | 2018-10-19 | Paper |
Secure and Efficient LCMQ Entity Authentication Protocol IEEE Transactions on Information Theory | 2017-06-08 | Paper |
| Research on brain vessel extraction via multi-modal convolutional neural networks | 2017-05-17 | Paper |
Quantum dialogue based on hypertanglement against collective noise International Journal of Theoretical Physics | 2017-03-30 | Paper |
Splitting unknown qubit state using five-qubit entangled state International Journal of Theoretical Physics | 2016-06-09 | Paper |
Two ways of robust quantum dialogue by using four-qubit cluster state International Journal of Theoretical Physics | 2016-06-09 | Paper |
An immune quantum communication model for dephasing noise using four-qubit cluster state International Journal of Theoretical Physics | 2016-04-08 | Paper |
Certificateless threshold signature secure in the standard model Information Sciences | 2015-09-23 | Paper |
| scientific article; zbMATH DE number 6454034 (Why is no real title available?) | 2015-06-29 | Paper |
| Status and research of software reliability models | 2014-06-30 | Paper |
Further improvement of an identity-based signcryption scheme in the standard model Computers and Electrical Engineering | 2013-08-19 | Paper |
An efficient conditionally anonymous ring signature in the random oracle model Theoretical Computer Science | 2012-11-27 | Paper |
Efficient and random oracle-free conditionally anonymous ring signature Provable Security | 2012-11-06 | Paper |
Efficient three-party authenticated key agreement protocol in certificateless cryptography International Journal of Computer Mathematics | 2012-05-23 | Paper |
Cryptanalysis of an identity based signcryption without random oracles Fundamenta Informaticae | 2011-11-22 | Paper |
A New Conditionally Anonymous Ring Signature Lecture Notes in Computer Science | 2011-08-17 | Paper |
RKP based secure tracking in wireless sensor networks Journal of Systems Engineering and Electronics | 2011-06-29 | Paper |
| A provably secure proxy signature scheme in certificateless cryptography | 2010-09-24 | Paper |
More efficient DDH pseudorandom generators Designs, Codes and Cryptography | 2010-03-26 | Paper |
Exploration of key points for attack of the MD5 algorithm Journal of Computer Applications | 2010-02-01 | Paper |
Modeling of virus propagation in peer-to-peer file-sharing networks Journal of Computer Applications | 2009-11-22 | Paper |
| An improved certificateless signature scheme secure in the standard model | 2009-02-12 | Paper |
Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks Cryptology and Network Security | 2009-01-09 | Paper |
| Improved AC-BM algorithm for matching multiple strings | 2007-08-29 | Paper |
| Design and implementation of distributed personal file system | 2006-03-01 | Paper |
| scientific article; zbMATH DE number 1983182 (Why is no real title available?) | 2003-09-18 | Paper |