Author of the publication

Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group.

, , and . KSII Trans. Internet Inf. Syst., 11 (11): 5625-5641 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy., , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 566-577. Springer, (2020)A trusted de-swinging k-anonymity scheme for location privacy protection., , , , , , and . J. Cloud Comput., (2022)Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model., , , , and . J. Cloud Comput., 13 (1): 4 (December 2024)A mobile energy trading scheme based on Lightning Network., , , and . Concurr. Comput. Pract. Exp., (2023)Is semi-selfish mining available without being detected?, , , , , and . Int. J. Intell. Syst., 37 (12): 10576-10597 (December 2022)IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel., , , and . IJDSN, (2020)Certificateless Short Aggregate Signature Scheme for Mobile Devices., , and . IEEE Access, (2019)LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection., , , , , , , and . IEEE Access, (2019)DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity., , , , and . IEEE Access, (2020)A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature., , , , , , and . IEEE Access, (2019)