Search

Showing total 3 results
3 results

Search Results

1. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.

2. Evolutionary Algorithm for RNA Secondary Structure Prediction Based on Simulated SHAPE Data.

3. Fuzzy jump wavelet neural network based on rule induction for dynamic nonlinear system identification with real data applications