Author of the publication

Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature.

, , , and . Comput. J., 54 (10): 1645-1651 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols., and . SEC, volume 232 of IFIP, page 109-120. Springer, (2007)Improved certificateless signature scheme provably secure in the standard model., , , , and . IET Inf. Secur., 6 (2): 102-110 (2012)Universal forgery on a group signature scheme using self-certified public keys.. Inf. Process. Lett., 89 (5): 227-231 (2004)Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP.. IWAP, volume 128 of Frontiers in Artificial Intelligence and Applications, page 51-65. IOS Press, (2005)Secure and Practical Key Distribution for RFID-Enabled Supply Chains., , and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 356-372. Springer, (2011)Controllable Ring Signatures., , , and . WISA, volume 4298 of Lecture Notes in Computer Science, page 1-14. Springer, (2006)On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme.. ICISC, volume 2587 of Lecture Notes in Computer Science, page 75-89. Springer, (2002)Insider attacks on multi-proxy multi-signature schemes., and . Comput. Electr. Eng., 33 (2): 88-93 (2007)Evolving privacy: From sensors to the Internet of Things., , , and . Future Gener. Comput. Syst., (2017)Ultra-Wideband Ranging System Prototype Design and Implementation., , , , , , , and . CSPS, volume 463 of Lecture Notes in Electrical Engineering, page 1848-1855. Springer, (2017)