From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts., , и . IACR Cryptology ePrint Archive, (2019)Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round., , , и . ProvSec, том 8209 из Lecture Notes in Computer Science, стр. 38-58. Springer, (2013)Identity Based Online/Offline Signcryption Scheme., , и . IACR Cryptology ePrint Archive, (2010)Breaking and Building of Group Inside Signature., , , и . IACR Cryptology ePrint Archive, (2009)On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing., , и . IACR Cryptology ePrint Archive, (2017)Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks., , и . IACR Cryptology ePrint Archive, (2012)Certificateless KEM and Hybrid Signcryption Schemes Revisited., , и . IACR Cryptology ePrint Archive, (2009)A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme., , , и . ProvSec, том 11192 из Lecture Notes in Computer Science, стр. 111-128. Springer, (2018)Identity Based Online/Offline Encryption and Signcryption Schemes Revisited., , и . InfoSecHiComNet, том 7011 из Lecture Notes in Computer Science, стр. 111-127. Springer, (2011)Identity-Based Deterministic Signature Scheme without Forking-Lemma., , и . IWSEC, том 7038 из Lecture Notes in Computer Science, стр. 79-95. Springer, (2011)