31 results on '"An-Phong Le"'
Search Results
2. Low Temperature Effect on Dynamic Mechanical Behavior of High Damping Rubber Bearings
3. Improving Power Efficiency of AESA System with GaN Supply-Modulated Power Amplifier
4. Horizontal response of base-isolated buildings supported to high damping rubber bearings
5. A Nonlinear Autoregressive Distributed Lag (NARDL) Analysis on the Determinants of Vietnam’s Stock Market
6. A New Modeling of Photovoltaic Power Generation
7. A New Secure Matrix Multiplication from Ring-LWE
8. Testing J-Curve Phenomenon in Vietnam: An Autoregressive Distributed Lag (ARDL) Approach
9. Privacy-Preserving Deep Learning: Revisited and Enhanced
10. Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers
11. A Generic yet Efficient Method for Secure Inner Product
12. IBE Under $$k$$-LIN with Shorter Ciphertexts and Private Keys
13. Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited
14. Key-Private Proxy Re-encryption under LWE
15. Leakage Resilient IBE and IPE under the DLIN Assumption
16. Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
17. Generic Fully Simulatable Adaptive Oblivious Transfer
18. Leakage Resilient Strong Key-Insulated Signatures in Public Channel
19. Provably Secure Convertible Undeniable Signatures with Unambiguity
20. Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
21. Leakage-Resilient RFID Authentication with Forward-Privacy
22. A Framework for Constructing Convertible Undeniable Signatures
23. New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
24. IBE Under -LIN with Shorter Ciphertexts and Private Keys.
25. Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited.
26. Key-Private Proxy Re-encryption under LWE.
27. Leakage Resilient IBE and IPE under the DLIN Assumption.
28. Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions.
29. Leakage-Resilient RFID Authentication with Forward-Privacy.
30. A Framework for Constructing Convertible Undeniable Signatures.
31. New RSA-Based (Selectively) Convertible Undeniable Signature Schemes.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.