| Publication | Date of Publication | Type |
|---|
| Distributed type-2 fuzzy adaptive control for heterogeneous nonlinear multiagent systems | 2024-07-25 | Paper |
| Enhanced extended state observer based prescribed time tracking control of wheeled mobile robot with slipping and skidding | 2024-07-23 | Paper |
| Fault frequency identification of rolling bearing using reinforced ensemble local mean decomposition | 2022-03-25 | Paper |
| A paid message forwarding scheme based on social network | 2021-12-08 | Paper |
| Secure server-aided data sharing clique with attestation | 2021-04-19 | Paper |
| Non-approximability and Polylogarithmic Approximations of the Single-Sink Unsplittable and Confluent Dynamic Flow Problems | 2020-11-25 | Paper |
| Multiple feature vectors based fault classification for WSN integrated bearing of rolling mill | 2018-12-12 | Paper |
| Batch blind signatures on elliptic curves | 2018-12-07 | Paper |
| Efficient subtree-based encryption for fuzzy-entity data sharing | 2018-11-27 | Paper |
| Linkable group signature for auditing anonymous communication | 2018-09-26 | Paper |
| Auditable hierarchy-private public-key encryption | 2018-09-26 | Paper |
| Bell-polynomial approach and Wronskian determinant solutions for three sets of differential-difference nonlinear evolution equations with symbolic computation | 2018-01-19 | Paper |
| Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response | 2017-05-16 | Paper |
| Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts | 2017-05-16 | Paper |
| Vector-soliton bound states for the coupled mixed derivative nonlinear Schrödinger equations in optical fibers | 2017-05-15 | Paper |
| Accelerating Oblivious Transfer with Batch Multi-exponentiation | 2016-08-31 | Paper |
| Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts | 2016-07-11 | Paper |
| Signatures in hierarchical certificateless cryptography: efficient constructions and provable security | 2016-07-08 | Paper |
| On sketching quadratic forms | 2016-04-15 | Paper |
| Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement | 2015-12-02 | Paper |
| \(N\)-soliton solutions and asymptotic analysis for a Kadomtsev-Petviashvili-Schrödinger system for water waves | 2015-11-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5500915 | 2015-08-10 | Paper |
| Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test | 2015-07-27 | Paper |
| Practical (fully) distributed signatures provably secure in the standard model | 2015-07-24 | Paper |
| Bell-polynomial approach and N-soliton solution for the extended Lotka–Volterra equation in plasmas | 2015-07-17 | Paper |
| Dark-soliton dynamics in a two-species Bose-Einstein condensate with the external potential and thermal cloud effects | 2015-02-26 | Paper |
| Hierarchical Identity-Based Broadcast Encryption | 2014-07-24 | Paper |
| Practical Distributed Signatures in the Standard Model | 2014-03-28 | Paper |
| Soliton interactions for a Hirota-Maxwell-Bloch system in the inhomogeneous erbium-doped fiber | 2013-11-12 | Paper |
| Provably secure threshold public-key encryption with adaptive security and short ciphertexts | 2012-10-25 | Paper |
| Soliton interactions in a generalized inhomogeneous coupled Hirota-Maxwell-Bloch system | 2012-07-17 | Paper |
| Bäcklund transformation, superposition formulae and \(N\)-soliton solutions for the perturbed Korteweg-de Vries equation | 2012-07-16 | Paper |
| Provably secure one-round identity-based authenticated asymmetric group key agreement protocol | 2012-07-13 | Paper |
| Bridging Broadcast Encryption and Group Key Agreement | 2011-12-02 | Paper |
| Solitonic Excitations and Interactions in the Three-Spine $\alpha$-Helical Protein with Inhomogeneity | 2011-11-10 | Paper |
| Fully Distributed Broadcast Encryption | 2011-09-16 | Paper |
| Bäcklund Transformation and Multisoliton Solutions in Terms of Wronskian Determinant for (2+1)-Dimensional Breaking Soliton Equations with Symbolic Computation | 2011-06-30 | Paper |
| Solitonic excitations and interactions in an α-helical protein modeled by three coupled nonlinear Schrödinger equations with variable coefficients | 2011-01-07 | Paper |
| Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts | 2010-12-17 | Paper |
| Efficient many-to-one authentication with certificateless aggregate signatures | 2010-11-25 | Paper |
| Identity-Based Authenticated Asymmetric Group Key Agreement Protocol | 2010-07-20 | Paper |
| Novel Efficient Certificateless Aggregate Signatures | 2010-01-14 | Paper |
| Identity-Based Verifiably Encrypted Signatures without Random Oracles | 2009-12-11 | Paper |
| Fast detection of vehicles based on the moving region | 2009-11-09 | Paper |
| Asymmetric Group Key Agreement | 2009-05-12 | Paper |
| Publicly Verifiable Privacy-Preserving Group Decryption | 2009-04-29 | Paper |
| Privacy for Private Key in Signatures | 2009-04-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5302982 | 2009-01-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3421366 | 2007-02-12 | Paper |
| Information Security Practice and Experience | 2005-09-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823845 | 2004-10-28 | Paper |
| C\(^1\)-smoothing of multipatch Bezier surfaces | 2001-08-06 | Paper |