Highly Influential Citations0
Claim Your Author Page
Ensure your research is discoverable on Semantic Scholar. Claiming your author page allows you to personalize the information displayed and manage publications (all current information on this profile has been aggregated automatically from publisher and metadata sources).
User authentication scheme allows user and server to authenticate each other, and generates a session key for the subsequent communication. How to resist the password guessing attacks and smart card… Continue Reading
A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group… Continue Reading
Secret sharing schemes are multi-party protocols related to key establishment. They also facilitate distributed trust or shared control for critical activities (e.g., signing corporate cheques and… Continue Reading
OBJECTIVE To detect the expression and the CpG island methylation status of tumor suppressor gene p15 after exposure to 1,4-benzoquinone (1,4-BQ) in primary cultivated C57BL/6J mouse bone marrow… Continue Reading
Aiming at small objects detection such as unmanned aerial vehicle (UAV), this paper proposes a fast object detection algorithm based on depth wise separable convolutions. Firstly, the inverted… Continue Reading