Author of the publication

Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model.

, , , , , and . Secur. Commun. Networks, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT., , , , , and . IEEE Internet Things J., 10 (24): 21322-21336 (December 2023)DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping., , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 155-174. Springer, (2019)K-Anonymity Algorithm Based on Improved Clustering., , , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 462-476. Springer, (2018)AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain., , , , , and . Comput. Secur., (2020)Xmark: Dynamic Software Watermarking Using Collatz Conjecture., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (11): 2859-2874 (2019)A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs., , , , , and . Digit. Commun. Networks, 9 (5): 1180-1189 (October 2023)Minimizing weighted earliness and tardiness penalties about a common due date on single machine with exponential processing times.. ACC, page 5752-5753. IEEE, (2004)Single machine scheduling with exponential processing times and a general form objective function.. ACC, page 4949-4950. IEEE, (2003)SSIR: Secure similarity image retrieval in IoT., , and . Inf. Sci., (2019)Outsourcing Encryption of Attribute-Based Encryption with MapReduce., , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 191-201. Springer, (2012)