Author of the publication

Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.

, , , and . ISC, volume 3225 of Lecture Notes in Computer Science, page 330-341. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security analysis and improvement of a double-trapdoor encryption scheme., , and . Appl. Math. Comput., 169 (1): 41-50 (2005)Comparison of trends in the quantity and variety of Science Citation Index (SCI) literature on human pathogens between China and the United States., , , and . Scientometrics, 93 (3): 1019-1027 (2012)Fair Electronic Cash Based on Double Signatur., , and . J. Comput. Sci. Technol., 17 (6): 830-835 (2002)A New Efficient Group Signature With Forward Security., , and . Informatica (Slovenia), 28 (2): 153-157 (2004)Secure and efficient lightweight RFID authentication protocol based on fast tag indexing., , , , and . Int. J. Commun. Syst., 27 (11): 3244-3254 (2014)Directed proxy signature with fast revocation proven secure in the standard model., , , , and . IET Inf. Secur., 11 (3): 168-176 (2017)Improvement on Meshram et al.'s ID-based cryptographic mechanism., , , and . Inf. Process. Lett., 113 (19-21): 789-792 (2013)On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key., , , and . Informatica (Slovenia), 29 (3): 243-346 (2005)Factors Affectting Customer's Behavior Intention., and . IPEC, page 108-112. ACM, (2021)Secure Double Auction Protocols with Full Privacy Protection., , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 215-229. Springer, (2003)