Wang, Xu An
Liu, Yudong
Sangaiah, Arun Kumar
Zhang, Jindan
Funding for this research was provided by:
National Cryptography Development Fund of China (MMJJ20170112)
National Nature Science Foundation of China (61772550, 61572521)
National Nature Science Foundation of China (U1636114, 61402531)
National Key Research and Development Program of China (2017YFB0802000)
Guangxi Key Laboratory of Cryptography and Information Security (GCIS201610)
Article History
Received: 31 March 2018
Accepted: 15 June 2018
First Online: 26 June 2018