| Publication | Date of Publication | Type |
|---|
| Growing simplicial complex with face dimension selection and preferential attachment | 2025-01-14 | Paper |
| Nonlocal numerical simulation of thermoelectric coupling field by using peridynamic differential operator | 2024-08-08 | Paper |
| Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data | 2024-07-01 | Paper |
| Enabling privacy-preserving non-interactive computation for Hamming distance | 2024-05-27 | Paper |
| Reliability evaluation for a class of recursive match networks | 2024-02-23 | Paper |
| Enhancing fault tolerance of balanced hypercube networks by the edge partition method | 2024-01-16 | Paper |
| Symmetric-Key Based Proofs of Retrievability Supporting Public Verification | 2022-08-19 | Paper |
| Connectivity and constructive algorithms of disjoint paths in dragonfly networks | 2022-06-13 | Paper |
| Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures | 2021-07-06 | Paper |
| Blockchain-based two-party fair contract signing scheme | 2021-05-03 | Paper |
| Enabling cloud storage auditing with key-exposure resilience under continual key-leakage | 2021-03-31 | Paper |
| How to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields | 2021-03-18 | Paper |
| Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction | 2020-09-08 | Paper |
| The reliability analysis of \(k\)-ary \(n\)-cube networks | 2020-08-17 | Paper |
| Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data | 2020-02-07 | Paper |
| Key-insulated aggregate signature | 2018-12-19 | Paper |
| IRIBE: intrusion-resilient identity-based encryption | 2018-05-22 | Paper |
| One forward-secure signature scheme using bilinear maps and its applications | 2017-01-31 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2951201 | 2017-01-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2993194 | 2016-08-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3193516 | 2015-10-28 | Paper |
| A multidimensional information model for managing construction information | 2015-06-23 | Paper |
| Enabling polarisation filtering in wireless communications: models, algorithms and characteristics | 2013-10-18 | Paper |
| New forward-secure signature scheme with untrusted update | 2012-10-26 | Paper |
| Forward-secure identity-based public-key encryption without random oracles | 2012-05-04 | Paper |
| A verifiable multi-secret-sharing scheme based on homogeneous linear recursion | 2011-09-29 | Paper |
| An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges | 2011-07-14 | Paper |
| Efficient unicast in bijective connection networks with the restricted faulty node set | 2011-06-22 | Paper |
| Embedding meshes into twisted-cubes | 2011-06-22 | Paper |
| Forward-secure identity-based signature: security notions and construction | 2011-01-28 | Paper |
| A local construction of the Smith normal form of a matrix polynomial | 2010-11-19 | Paper |
| Improved generalized Atkin algorithm for computing square roots in finite fields | 2010-01-18 | Paper |
| Workflow Scheduling Algorithms for Grid Computing | 2009-02-13 | Paper |
| Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps | 2009-01-27 | Paper |
| Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005 | 2009-01-27 | Paper |
| A new proactive secret sharing scheme | 2008-06-03 | Paper |
| New Left-to-Right Radix-r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems | 2007-11-13 | Paper |
| Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem | 2007-11-13 | Paper |
| Verifiable secret redistribution for proactive secret sharing schemes | 2006-11-15 | Paper |
| An efficient forward secure signature scheme | 2006-11-15 | Paper |