| Publication | Date of Publication | Type |
|---|
| Beyond volume pattern: storage-efficient Boolean searchable symmetric encryption with suppressed leakage | 2024-06-05 | Paper |
| Additive centralized and Stackelberg DEA models for two‐stage system with shared resources | 2023-11-17 | Paper |
| Towards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing scheme | 2023-11-09 | Paper |
| Human-exoskeleton oscillation model and qualitative analysis of interaction and functional practicality of exoskeletons | 2023-10-13 | Paper |
| Bayesian mechanism for rational secret sharing scheme | 2022-10-28 | Paper |
| Universally composable secure TNC model and EAP-TNC protocol in IF-T | 2022-10-28 | Paper |
| Universally composable secure positioning in the bounded retrieval model | 2022-10-28 | Paper |
| A rumor spreading model based on two propagation channels in social networks | 2022-07-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5035536 | 2022-02-22 | Paper |
| Operating efficiency assessment of commercial banks with Cooperative-Stackelberg hybrid two-stage DEA | 2022-02-21 | Paper |
| Adversarial link deception against the link prediction in complex networks | 2022-01-20 | Paper |
| Spectrum privacy preserving for social networks: a personalized differential privacy approach | 2021-12-08 | Paper |
| Privacy-preserving Krawtchouk moment feature extraction over encrypted image data | 2021-11-23 | Paper |
| Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification | 2020-12-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5128070 | 2020-10-27 | Paper |
| FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure | 2020-07-20 | Paper |
| A reusable and single-interactive model for secure approximate \(k\)-nearest neighbor query in cloud | 2020-02-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5196981 | 2019-09-20 | Paper |
| Automated enforcement for relaxed information release with reference points | 2018-11-01 | Paper |
| On the control of opinion dynamics in social networks | 2018-09-20 | Paper |
| The postprocessing of quantum digital signatures | 2017-10-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2984848 | 2017-05-17 | Paper |
| Verifiable Computation over Large Database with Incremental Updates | 2017-05-16 | Paper |
| Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation | 2017-05-16 | Paper |
| A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains | 2017-05-16 | Paper |
| Robust quantum private queries | 2017-03-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2951210 | 2017-01-06 | Paper |
| Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy | 2016-11-02 | Paper |
| Towards Efficient Fully Randomized Message-Locked Encryption | 2016-08-31 | Paper |
| A rational framework for secure communication | 2015-09-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5500920 | 2015-08-10 | Paper |
| Verifiable Computation over Large Database with Incremental Updates | 2015-07-24 | Paper |
| Stability analysis of an \textit{e-SEIAR} model with point-to-group worm propagation | 2015-01-29 | Paper |
| Efficient algorithms for secure outsourcing of bilinear pairings | 2014-12-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5400241 | 2014-02-28 | Paper |
| New Algorithms for Secure Outsourcing of Modular Exponentiations | 2013-10-23 | Paper |
| A one-time rational secret sharing scheme based on Bayesian game | 2012-06-01 | Paper |
| Combined blur, translation, scale and rotation invariant image recognition by Radon and pseudo-Fourier-Mellin transforms | 2011-11-10 | Paper |
| Constructing polynomials for generating pairing-friendly elliptic curves | 2011-09-29 | Paper |
| A study on the flow in helical elliptical pipes with Galerkin method | 2011-03-31 | Paper |
| Numerical analysis of the fluid flow in a rotating curved elliptical pipe | 2011-03-10 | Paper |
| Laminar developing flow in the entrance region of rotating curved pipes | 2011-01-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3054724 | 2010-11-05 | Paper |
| Elastoplastic meshless integral method | 2010-09-14 | Paper |
| An efficient signcryption scheme with forward secrecy | 2010-07-08 | Paper |
| Image analysis by Bessel-Fourier moments | 2010-06-08 | Paper |
| Local Poincaré Symmetry in Gauge Theory of Gravity | 2009-08-27 | Paper |
| Secure Error-Correction Network Coding in a Randomized Setting | 2009-06-25 | Paper |
| Key hierarchies for hierarchical access control in secure group communications | 2009-03-11 | Paper |
| A new approach for UC security concurrent deniable authentication | 2009-01-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5453167 | 2008-04-04 | Paper |
| Theoretical analysis of convective heat transfer of Oldroyd-B fluids in a curved pipe | 2008-03-11 | Paper |
| Universally composable anonymous hash certification model | 2007-10-12 | Paper |
| A meshless integral method based on regularized boundary integral equation | 2007-10-04 | Paper |
| Scaling and rotation invariant analysis approach to object recognition based on Radon and Fourier-Mellin transforms | 2007-09-14 | Paper |
| Galerkin method study on flow of Oldroyd-B fluids in curved circular cross-section pipes | 2007-09-03 | Paper |
| Applied Cryptography and Network Security | 2007-05-02 | Paper |
| Security extension for the Canetti-Krawczyk model in identity-based systems | 2007-02-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3422582 | 2007-02-13 | Paper |
| Research and implementation of total-ordered multicast protocol considering overlapped groups | 2006-10-04 | Paper |
| Computational Science – ICCS 2005 | 2005-11-30 | Paper |
| Theoretical and numerical analysis of convective heat transfer in the rotating helical pipes. | 2004-05-27 | Paper |
| Using transforming matrices to generate DNA clone grids | 2003-09-09 | Paper |