Author of the publication

Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions.

, , , , and . J. Comput. Sci. Technol., 34 (6): 1366-1379 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elastic experiences: designing adaptive interaction for individuals and crowds in the public space., , , , and . OZCHI, page 148-151. ACM, (2011)IoT Privacy-Preserving Data Mining With Dynamic Incentive Mechanism., , , , and . IEEE Internet Things J., 11 (1): 777-790 (January 2024)Enhanced Security Identity-Based Privacy-Preserving Authentication Scheme Supporting Revocation for VANETs., , , , and . IEEE Syst. J., 14 (4): 5373-5383 (2020)Software Defined Intelligent Building., , , , , and . Int. J. Inf. Secur. Priv., 9 (3): 84-99 (2015)Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records., , , , and . IEEE Trans. Serv. Comput., 16 (5): 3210-3223 (September 2023)An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 1280-1291 (2022)3D High-quality Textile Reconstruction with Synthesized Texture., , , , and . ICCS, volume 108 of Procedia Computer Science, page 355-364. Elsevier, (2017)Privacy-Preserving Cloud Auditing with Multiple Uploaders., , , and . ISPEC, volume 10060 of Lecture Notes in Computer Science, page 224-237. (2016)A broadband Variable Gain Amplifier for the Square Kilometer Array., , and . ISCAS, page 2267-2270. IEEE, (2013)Chirp extraction of wave-breaking-free soliton in a passively mode-locked Yb-doped fiber laser based on STFT and WVD., , , and . CCIS, page 569-573. IEEE, (2011)