Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol.. J. Supercomput., 66 (2): 863-874 (2013)A Study on Privacy-Preserving GRU Inference Framework., , and . IACR Cryptol. ePrint Arch., (2020)Multi-dimensional quantum state sharing based on quantum Fourier transform., , and . Quantum Inf. Process., 17 (3): 48 (2018)Identity-Based Blind Multisignature From Lattices., , and . IEEE Access, (2019)An Adaptive Kelly Betting Strategy for Finite Repeated Games., , , and . ICGEC (2), volume 388 of Advances in Intelligent Systems and Computing, page 39-46. Springer, (2015)Cryptanalysis of Exhaustive Search on Attacking RSA., , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 373-379. Springer, (2012)On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks., , , , and . J. Univers. Comput. Sci., 21 (3): 406-418 (2015)Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud., , , and . IEEE Access, (2018)Intelligence-led response: turning theory into law enforcement practice in cyber security incidents., , and . Int. J. Electron. Bus., 15 (4): 325-350 (2020)Convertible ring signatures with gradual revelation of non-signers.. Secur. Commun. Networks, 5 (3): 279-286 (2012)