Qi Xie

Orcid: 0009-0001-7851-4605

According to our database1, Qi Xie authored at least 174 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Robust 3D watermarking with high imperceptibility based on EMD on surfaces.
Vis. Comput., November, 2024

Low-Light Image Enhancement by Retinex-Based Algorithm Unrolling and Adjustment.
IEEE Trans. Neural Networks Learn. Syst., November, 2024

Rotation Equivariant Proximal Operator for Deep Unfolding Methods in Image Restoration.
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024

Blockchain-Based Traffic Accident Handling Protocol Without Third Party for VANETs.
IEEE Internet Things J., October, 2024

RCDNet: An Interpretable Rain Convolutional Dictionary Network for Single Image Deraining.
IEEE Trans. Neural Networks Learn. Syst., June, 2024

Security Analysis on a Three-Factor Authentication Scheme of 5G Wireless Sensor Networks for IoT System.
IEEE Internet Things J., April, 2024

Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare.
IEEE Internet Things J., March, 2024

A Learnable Optimization and Regularization Approach to Massive MIMO CSI Feedback.
IEEE Trans. Wirel. Commun., January, 2024

OSCNet: Orientation-Shared Convolutional Network for CT Metal Artifact Learning.
IEEE Trans. Medical Imaging, January, 2024

Project Portfolio Network Risk Propagation Modeling: A Risk Perception Perspective.
IEEE Trans. Engineering Management, 2024

A Hybrid Simulation Model for the Allocation of Shared Resources in a Project Portfolio.
IEEE Trans. Engineering Management, 2024

M2Diffuser: Diffusion-based Trajectory Optimization for Mobile Manipulation in 3D Scenes.
CoRR, 2024

PR2: A Physics- and Photo-realistic Testbed for Embodied AI and Humanoid Robots.
CoRR, 2024

TRG-Net: An Interpretable and Controllable Rain Generator.
CoRR, 2024

A hob-type smart weeding machine for use in wheat fields: Towards a low power consumption and high-efficiency design.
Comput. Electron. Agric., 2024

Dynamic selection of risk response strategies with resource allocation for construction project portfolios.
Comput. Ind. Eng., 2024

Multi-Source Augmentation and Composite Prompts for Visual Recognition with Missing Modality.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024

RegGPT: A Tool for Cross-Domain Service Regulation Language Conversion.
Proceedings of the IEEE International Conference on Web Services, 2024

2023
Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs.
IEEE Trans. Veh. Technol., December, 2023

Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud.
J. Cloud Comput., December, 2023

Provably secure and lightweight three-factor authentication scheme for industrial medical CPS.
J. Inf. Secur. Appl., December, 2023

Proof of retrievability with flexible designated verification for cloud storage.
Comput. Secur., December, 2023

Novel and fast EMD-based image fusion via morphological filter.
Vis. Comput., September, 2023

Precision weed detection in wheat fields for agriculture 4.0: A survey of enabling technologies, methods, and research challenges.
Comput. Electron. Agric., September, 2023

Fourier Series Expansion Based Filter Parametrization for Equivariant Convolutions.
IEEE Trans. Pattern Anal. Mach. Intell., April, 2023

Novel optimization-based bidimensional empirical mode decomposition.
Digit. Signal Process., March, 2023

Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs.
IEEE Trans. Intell. Transp. Syst., 2023

PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023

Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage".
IEEE Trans. Inf. Forensics Secur., 2023

Big Data Analytic Toolkit: A general-purpose, modular, and heterogeneous acceleration toolkit for data analytical engines.
Proc. VLDB Endow., 2023

Memory-Augmented Deep Unfolding Network for Guided Image Super-resolution.
Int. J. Comput. Vis., 2023

FRS-Nets: Fourier Parameterized Rotation and Scale Equivariant Networks for Retinal Vessel Segmentation.
CoRR, 2023

A Cross-Trusted Authority Authentication Protocol for Internet of Vehicles Based on Blockchain.
IEEE Access, 2023

CACPA: Credible Alliance-Chain-Based Public Auditing Scheme for Cloud Storage.
IEEE Access, 2023

Novel 3D Model Zero-Watermarking Using Geometrical and Statistical Features.
Proceedings of the Image and Graphics - 12th International Conference, 2023

The Function of Transmembrane Helix and Signal Sequence of Coronavirus in Co-Translational Targeting and Insertion Towards Er.
Proceedings of the 13th International Conference on Bioscience, 2023

JARAD: An Approach for Java API Mention Recognition and Disambiguation in Stack Overflow.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

Fiber Coupling Efficiency of Partially Coherent Gaussian Beam in Ground-to-HAP Free-Space Optical Communication Systems.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023

2022
Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., 2022

Automating App Review Response Generation Based on Contextual Knowledge.
ACM Trans. Softw. Eng. Methodol., 2022

An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System.
IEEE Trans. Green Commun. Netw., 2022

MHF-Net: An Interpretable Deep Network for Multispectral and Hyperspectral Image Fusion.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

Soft Actor-Critic-Based Multilevel Cooperative Perception for Connected Autonomous Vehicles.
IEEE Internet Things J., 2022

A two-factor security authentication scheme for wireless sensor networks in IoT environments.
Neurocomputing, 2022

Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage.
IACR Cryptol. ePrint Arch., 2022

Multigroup recognition of dementia patients with dynamic brain connectivity under multimodal cortex parcellation.
Biomed. Signal Process. Control., 2022

CProtMEDIAS: clustering of amino acid sequences encoded by gene families by MErging and DIgitizing Aligned Sequences.
Briefings Bioinform., 2022

Orientation-Shared Convolution Representation for CT Metal Artifact Learning.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2022, 2022

Pocket2Mol: Efficient Molecular Sampling Based on 3D Protein Pockets.
Proceedings of the International Conference on Machine Learning, 2022

Household Load Identification Based on Multi-label and Convolutional Neural Networks.
Proceedings of the ICDLT 2022: 6th International Conference on Deep Learning Technologies, Xi'an, China, July 26, 2022

The Production of English Question Intonation by Cantonese and Mandarin Speakers.
Proceedings of the International Conference on Asian Language Processing, 2022

KXNet: A Model-Driven Deep Neural Network for Blind Super-Resolution.
Proceedings of the Computer Vision - ECCV 2022, 2022

Research and Implementation of Real World Traditional Chinese Medicine Clinical Scientific Research Information Electronic Medical Record Sharing System.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

GCN-Based Topology Design for Decentralized Federated Learning in IoV.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

2021
A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things.
Secur. Commun. Networks, 2021

Structural residual learning for single image rain removal.
Knowl. Based Syst., 2021

Syntactic Information and Multiple Semantic Segments for Aspect-Based Sentiment Classification.
Int. J. Asian Lang. Process., 2021

A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city.
EURASIP J. Wirel. Commun. Netw., 2021

RCDNet: An Interpretable Rain Convolutional Dictionary Network for Single Image Deraining.
CoRR, 2021

An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time.
IEEE Access, 2021

Aspect-based Sentiment Classification with Dependency Relation and Structured Attention.
Proceedings of the International Conference on Asian Language Processing, 2021

From Rain Generation to Rain Removal.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Learning an Explicit Weighting Scheme for Adapting Complex HSI Noise.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Learning to Purify Noisy Labels via Meta Soft Label Corrector.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Full-Spectrum-Knowledge-Aware Tensor Model for Energy-Resolved CT Iterative Reconstruction.
IEEE Trans. Medical Imaging, 2020

Enhanced 3DTV Regularization and Its Applications on HSI Denoising and Compressed Sensing.
IEEE Trans. Image Process., 2020

Contrast-Medium Anisotropy-Aware Tensor Total Variation Model for Robust Cerebral Perfusion CT Reconstruction With Low-Dose Scans.
IEEE Trans. Computational Imaging, 2020

Single image rain streaks removal: a review and an exploration.
Int. J. Mach. Learn. Cybern., 2020

A semi-supervised approach for extracting TCM clinical terms based on feature words.
BMC Medical Informatics Decis. Mak., 2020

Screening and Identification of Key Biomarkers in Pancreatic Cancer: Evidence from Bioinformatic Analysis.
J. Comput. Biol., 2020

Feature Selection Using Improved Forest Optimization Algorithm.
Inf. Technol. Control., 2020

From Rain Removal to Rain Generation.
CoRR, 2020

Structural Residual Learning for Single Image Rain Removal.
CoRR, 2020

Color and direction-invariant nonlocal self-similarity prior and its application to color image denoising.
Sci. China Inf. Sci., 2020

A Model-Driven Deep Neural Network for Single Image Rain Removal.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Knowledge-Enabled Diagnosis Assistant Based on Obstetric EMRs and Knowledge Graph.
Proceedings of the Chinese Computational Linguistics - 19th China National Conference, CCL 2020, Hainan, China, October 30, 2020

Obstetric Diagnosis Assistant via Knowledge Powered Attention and Information-Enhanced Strategy.
Proceedings of the Knowledge Graph and Semantic Computing: Knowledge Graph and Cognitive Intelligence, 2020

Malware Family Classification using LSTM with Attention.
Proceedings of the 13th International Congress on Image and Signal Processing, 2020

2019
An Efficient Iterative Cerebral Perfusion CT Reconstruction via Low-Rank Tensor Decomposition With Spatial-Temporal Total Variation Regularization.
IEEE Trans. Medical Imaging, 2019

Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city.
Neurocomputing, 2019

Push the Student to Learn Right: Progressive Gradient Correcting by Meta-learner on Corrupted Labels.
CoRR, 2019

Meta-Weight-Net: Learning an Explicit Mapping For Sample Weighting.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Exploration of TCM Health Service Mode in the Context of Aging Society.
Proceedings of the 2nd International Conference on Human Systems Engineering and Design: Future Trends and Applications, 2019

Standardized Research of Clinical Diagnosis and Treatment Data of Epilepsy.
Proceedings of the 2nd International Conference on Human Systems Engineering and Design: Future Trends and Applications, 2019

Tools and benchmarks for automated log parsing.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019

Multispectral and Hyperspectral Image Fusion by MS/HS Fusion Net.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Intelligent real-time pressure tracking system using a novel hybrid control scheme.
Trans. Inst. Meas. Control, 2018

Kronecker-Basis-Representation Based Tensor Sparsity and Its Applications to Tensor Recovery.
IEEE Trans. Pattern Anal. Mach. Intell., 2018

An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multim. Tools Appl., 2018

Enhanced 3DTV Regularization and Its Applications on Hyper-spectral Image Denoising and Compressed Sensing.
CoRR, 2018

Unsupervised/Semi-supervised Deep Learning for Low-dose CT Enhancement.
CoRR, 2018

Intelligent Electro-Pneumatic Position Tracking System Using Improved Mode-Switching Sliding Control With Fuzzy Nonlinear Gain.
IEEE Access, 2018

Video Rain Streak Removal by Multiscale Convolutional Sparse Coding.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Detecting Duplicate Bug Reports with Convolutional Neural Networks.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks.
Wirel. Pers. Commun., 2017

An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
Wirel. Pers. Commun., 2017

A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.
Wirel. Pers. Commun., 2017

Low-Dose Dynamic Cerebral Perfusion Computed Tomography Reconstruction via Kronecker-Basis-Representation Tensor Sparsity Regularization.
IEEE Trans. Medical Imaging, 2017

Robust Low-Dose CT Sinogram Preprocessing via Exploiting Noise-Generating Mechanism.
IEEE Trans. Medical Imaging, 2017

Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Inf. Forensics Secur., 2017

Transcription elongation factors represent <i>in vivo</i> cancer dependencies in glioblastoma.
Nat., 2017

An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem.
Int. J. Netw. Secur., 2017

Weighted Nuclear Norm Minimization and Its Applications to Low Level Vision.
Int. J. Comput. Vis., 2017

Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
Sci. China Inf. Sci., 2017

Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks.
Comput. Electr. Eng., 2017

CARP: Context-Aware Reliability Prediction of Black-Box Web Services.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Data Flow-Oriented Multi-Path Semantic Web Service Composition Using Extended SPARQL.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Self-Paced Co-training.
Proceedings of the 34th International Conference on Machine Learning, 2017

Should We Encode Rain Streaks in Video as Deterministic or Stochastic?
Proceedings of the IEEE International Conference on Computer Vision, 2017

An Online Prediction Framework for Dynamic Service-Generated QoS Big Data.
Proceedings of the Database Systems for Advanced Applications, 2017

A Survey of Wireless Sensor Technique Applications for Medical Care.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

The Design and Research of the Internet of Things Technology in the Training of Spatial Navigation Ability of Patients with Mild Cognitive Impairment.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol.
Int. J. Commun. Syst., 2016

Asymmetric Correlation Regularized Matrix Factorization for Web Service Recommendation.
Proceedings of the IEEE International Conference on Web Services, 2016

An Improved, Feature-Centric LoG Approach for Edge Detection.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

Multispectral Images Denoising by Intrinsic Tensor Sparsity Regularization.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, 2016

2015
Practical identity-based encryption in multiple private key generator (PKG) environments.
Secur. Commun. Networks, 2015

A Novel Sparsity Measure for Tensor Recovery.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

Convolutional Sparse Coding for Image Super-Resolution.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

QoS Prediction in Dynamic Web Services with Asymmetric Correlation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Availability and Network-Aware MapReduce Task Scheduling over the Internet.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Self-Paced Learning for Matrix Factorization.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Correlation-Based Top-k Recommendation for Web Services.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Identity-Based One Round Key Agreement Protocol without Bilinear Pairings.
Proceedings of the 10th International Conference on P2P, 2015

2014
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network.
Wirel. Pers. Commun., 2014

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014

A practical anonymous authentication protocol for wireless roaming.
Secur. Commun. Networks, 2014

Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2014

Pairing-Free Certificateless Signature with Security Proof.
J. Comput. Networks Commun., 2014

Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks.
Int. J. Distributed Sens. Networks, 2014

On the Optimal Solution of Weighted Nuclear Norm Minimization.
CoRR, 2014

Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme.
Concurr. Comput. Pract. Exp., 2014

Real-time accurate ball trajectory estimation with "asynchronous" stereo camera system for humanoid Ping-Pong robot.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

TCM syndrome classification of AIDS based on Manifold ranking.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Big Data, 2014

TCM syndrome differentiation of AIDS using subspace clustering algorithm.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

Road Detection Based on Off-Line and On-Line Learning.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks.
IEEE Trans. Ind. Informatics, 2013

Robust Anonymous Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2013

Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification.
Inf. Technol. Control., 2013

A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.
Proceedings of the Network and System Security - 7th International Conference, 2013

Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Complex network approach for analyzing TCM clinical herb-symptom relationships.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

2012
Improvement of a security enhanced one-time two-factor authentication and key agreement scheme.
Sci. Iran., 2012

Provably Secure Self-certified Multi-proxy Signature with Message Recovery.
J. Networks, 2012

A new authenticated key agreement for session initiation protocol.
Int. J. Commun. Syst., 2012

Provably secure convertible multi-authenticated encryption scheme.
IET Inf. Secur., 2012

Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Real-world clinical data mining on TCM clinical diagnosis and treatment: A survey.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Thinking of comparative effectiveness research of the combination in the real traditional Chinese medicine world.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Constructing ideas of health service platform for the elderly.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Construction of national clinical research data center of Traditional Chinese medicine.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

A predictive modeling engine using neural networks: Diabetes management from sensor and activity data.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Research on the nomenclature relations of conceptual system in fundamental theory of Traditional Chinese Medicine.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Practical research of conceptual system framework based on TCM basic theory.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

2011
Subdivision connectivity remeshing and its applications.
Comput. Animat. Virtual Worlds, 2011

Privacy-preserving matchmaking For mobile social networking secure against malicious users.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

QoS Driven Web Services Evolution.
Proceedings of the International Conference on Complex, 2011

Near-optimal configuration of service pool size in service composition.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

2010
Two Improved Multi-server Authentication Protocols Based on Hash Function and Smart Card.
J. Networks, 2010

The obstacle crossing analysis and improvement of a wheel-based cable climbing robot.
Int. J. Intell. Syst. Technol. Appl., 2010

Personalized Context-Aware QoS Prediction for Web Services Based on Collaborative Filtering.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
Efficient Hierarchical Quorums in Unstructured Peer-to-Peer Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

FaceCloak: An Architecture for User Privacy on Social Networking Sites.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A Novel User Authentication Scheme Using Smart Cards.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

ThreshoWeb Security and Data Managementld Signature Scheme Based on Modular Secret Sharing.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

The Diffie-Hellman Authentication Test in the Strand-Space Mode.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

Investigation of wireless data transmission between hearing aids.
Proceedings of the 3rd International ICST Conference on Body Area Networks, 2008

2007
Combinative Reasoning with RCC5 and Cardinal Direction Relations.
Proceedings of the Knowledge Science, 2007

Investigating Novel Immune-Inspired Multi-agent Systems for Anomaly Detection.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

2006
Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes.
Int. J. Netw. Secur., 2006

Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules.
Proceedings of the Rough Sets and Knowledge Technology, First International Conference, 2006

Research on Description Logic Based Conflict Detection Methods for RB-RBAC Model.
Proceedings of the Advances in Intelligent IT, 2006

2005
Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers.
Appl. Math. Comput., 2005

2004
Cryptanalysis of Tseng et al.'s authenticated encryption schemes.
Appl. Math. Comput., 2004


  Loading...