| Publication | Date of Publication | Type |
|---|
| Towards secure asynchronous messaging with forward secrecy and mutual authentication | 2024-05-02 | Paper |
| Certainty Equivalence Control of Discrete-Time Multiagent Systems: A Framework for Uniform Global Exponential Stability | 2024-02-29 | Paper |
| Synchronization of heterogeneous harmonic oscillators for generalized uniformly jointly connected networks | 2024-02-13 | Paper |
| Distributed dual objective control of an energy storage system under jointly connected switching networks | 2023-06-26 | Paper |
| Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy | 2023-05-26 | Paper |
| Multistability analysis of quaternion-valued neural networks with cosine activation functions | 2023-04-21 | Paper |
| Forward-Secure Group Encryptions from Lattices | 2023-04-13 | Paper |
| Additive properties for the pseudo core inverse of morphisms in an additive category | 2023-01-02 | Paper |
| New Practical Public-Key Deniable Encryption | 2022-12-21 | Paper |
| Attribute based broadcast encryption with short ciphertext and decryption key | 2022-08-19 | Paper |
| The pseudo core inverses of differences and products of projections in rings with involution | 2022-06-29 | Paper |
| On the weighted pseudo Drazin invertible elements in associative rings and Banach algebras | 2022-06-07 | Paper |
| Rank equalities related to a class of outer generalized inverse | 2022-06-03 | Paper |
| Robust stability analysis of impulsive quaternion-valued neural networks with distributed delays and parameter uncertainties | 2022-03-07 | Paper |
| Effects of parallel importation and power structures on price competition in duopolistic supply chains | 2022-01-24 | Paper |
| Location-price game in a dual-circle market with different demand levels | 2022-01-24 | Paper |
| Exclusivity or competitor retail? Impacts of channel structures on multinational supply chains considering green manufacturing | 2022-01-21 | Paper |
| Robust asymptotical stability and stabilization of fractional-order complex-valued neural networks with delay | 2022-01-11 | Paper |
| Two-player location-price game in a spoke market with linear transportation cost | 2022-01-11 | Paper |
| An Efficient Contact Search Algorithm for Three-Dimensional Sphere Discontinuous Deformation Analysis | 2021-12-16 | Paper |
| Global exponential synchronization via nonlinear feedback control for delayed inertial memristor-based quaternion-valued neural networks with impulses | 2021-11-10 | Paper |
| Generalized WG inverse | 2021-11-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3381115 | 2021-09-29 | Paper |
| Right core inverses of a product and a companion matrix | 2021-09-13 | Paper |
| The \((b, c)\)-inverse in semigroups and rings with involution | 2021-06-24 | Paper |
| Optimal preventive ``maintenance-first or -last policies with generalized imperfect maintenance models | 2021-06-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4984618 | 2021-04-26 | Paper |
| Global Analysis of an Asymmetric Continuous Piecewise Linear Differential System with Three Linear Zones | 2021-03-12 | Paper |
| Two-player location game in a closed-loop market with quantity competition | 2020-10-21 | Paper |
| New publicly verifiable computation for batch matrix multiplication | 2020-10-07 | Paper |
| Privacy preserving multi-party computation delegation for deep learning in cloud computing | 2020-09-09 | Paper |
| Global Dynamics of a Planar Filippov System with Symmetry | 2020-08-18 | Paper |
| Robust stability analysis of quaternion-valued neural networks with time delays and parameter uncertainties | 2020-05-18 | Paper |
| Complete bifurcation diagram and global phase portraits of Liénard differential equations of degree four | 2020-03-09 | Paper |
| Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing | 2020-02-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5193716 | 2019-09-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5194120 | 2019-09-20 | Paper |
| Parameter-range-dependent robust stability conditions for quaternion-valued neural networks with time delays | 2019-05-20 | Paper |
| Multistability of complex-valued neural networks with time-varying delays | 2019-03-27 | Paper |
| Global \(\mu\)-stability of complex-valued neural networks with unbounded time-varying delays | 2019-02-14 | Paper |
| Global \(\mu\)-stability of impulsive complex-valued neural networks with leakage delay and mixed delays | 2019-02-14 | Paper |
| Robust stability analysis of quaternion-valued neural networks via LMI approach | 2019-01-21 | Paper |
| Robust stability analysis of impulsive complex-valued neural networks with mixed time delays and parameter uncertainties | 2019-01-17 | Paper |
| Secure publicly verifiable computation with polynomial commitment in cloud computing | 2018-09-26 | Paper |
| Efficient request-based comparable encryption scheme based on sliding window method | 2017-09-08 | Paper |
| Stability analysis of nonlinear fractional-order systems with variable-time impulses | 2017-06-07 | Paper |
| Identity-Based Encryption with Outsourced Revocation in Cloud Computing | 2017-05-16 | Paper |
| Verifiable Computation over Large Database with Incremental Updates | 2017-05-16 | Paper |
| Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation | 2017-05-16 | Paper |
| Secure Distributed Deduplication Systems with Improved Reliability | 2017-05-16 | Paper |
| Towards Efficient Fully Randomized Message-Locked Encryption | 2016-08-31 | Paper |
| Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures | 2016-08-31 | Paper |
| An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption | 2016-07-06 | Paper |
| Essential sign change numbers of full sign pattern matrices | 2016-07-04 | Paper |
| N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks | 2016-05-06 | Paper |
| Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach | 2016-01-27 | Paper |
| Identity-based chameleon hashing and signatures without key exposure | 2016-01-14 | Paper |
| Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts | 2015-09-29 | Paper |
| Secure deduplication storage systems supporting keyword search | 2015-08-31 | Paper |
| Verifiable Computation over Large Database with Incremental Updates | 2015-07-24 | Paper |
| Efficient algorithms for secure outsourcing of bilinear pairings | 2014-12-02 | Paper |
| A New Signature Scheme Without Random Oracles from Bilinear Pairings | 2014-08-21 | Paper |
| A Secure Three-Party Computational Protocol for Triangle Area | 2014-07-24 | Paper |
| TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage | 2014-07-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5166153 | 2014-06-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2858476 | 2013-11-19 | Paper |
| New Algorithms for Secure Outsourcing of Modular Exponentiations | 2013-10-23 | Paper |
| Discrete logarithm based chameleon hashing and signatures without key exposure | 2013-05-31 | Paper |
| Non-interactive Deniable Authentication Protocols | 2013-01-07 | Paper |
| Non-delegatable Strong Designated Verifier Signature on Elliptic Curves | 2012-11-01 | Paper |
| Generic security-amplifying methods of ordinary digital signatures | 2012-10-17 | Paper |
| A Short Non-delegatable Strong Designated Verifier Signature | 2012-09-07 | Paper |
| Global exponential stability of antiperiodic solutions for discrete-time neural networks with mixed delays and impulses | 2012-08-14 | Paper |
| Identity-based trapdoor mercurial commitments and applications | 2011-10-10 | Paper |
| Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring | 2011-07-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3016683 | 2011-07-19 | Paper |
| New receipt-free voting scheme using double-trapdoor commitment | 2011-06-17 | Paper |
| Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05 | 2010-08-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3570991 | 2010-07-08 | Paper |
| Attack on an ID-based authenticated group key agreement scheme from PKC 2004 | 2009-07-21 | Paper |
| The ring authenticated encryption scheme-how to provide a clue wisely | 2009-03-24 | Paper |
| Efficient Generic On-Line/Off-Line Signatures Without Key Exposure | 2009-03-10 | Paper |
| A Tamper-Evident Voting Machine Resistant to Covert Channels | 2009-01-27 | Paper |
| Efficient generic on-line/off-line (threshold) signatures without key exposure | 2008-11-20 | Paper |
| Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings | 2008-09-09 | Paper |
| Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature | 2008-06-10 | Paper |
| Generalization of functional equation for the square root spiral | 2007-01-11 | Paper |
| Information Security | 2006-10-16 | Paper |
| Information Security | 2006-10-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5718410 | 2006-01-16 | Paper |
| Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
| Information Security Practice and Experience | 2005-09-13 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4654453 | 2005-03-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4825258 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4795667 | 2003-10-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4708747 | 2003-06-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2706880 | 2001-07-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2719611 | 2001-06-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3489488 | 1989-01-01 | Paper |