Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Group-oriented Proofs of Storage., , , , , and . AsiaCCS, page 73-84. ACM, (2015)New Publicly Verifiable Computation for Batch Matrix Multiplication., , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 53-65. (2017)Publicly Verifiable Auctions with Minimal Leakage., , , and . COMPSAC, page 384-389. IEEE Computer Society, (2004)Society-oriented Designated Confirmer Signatures., , and . ICNC (5), page 707-712. IEEE Computer Society, (2007)Multi-device Anonymous Authentication., , , and . NSS, volume 9955 of Lecture Notes in Computer Science, page 21-36. Springer, (2016)Chameleon Hashing Without Key Exposure., , and . ISC, volume 3225 of Lecture Notes in Computer Science, page 87-98. Springer, (2004)Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group., , , and . ISC, volume 3225 of Lecture Notes in Computer Science, page 330-341. Springer, (2004)Efficient and Verifiable Proof of Replication with Fast Fault Localization., , , , , and . INFOCOM, page 1-10. IEEE, (2021)Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT., , , and . IEEE Internet Things J., 8 (4): 2886-2899 (2021)A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem., , , , and . IEEE Internet Things J., 6 (6): 10251-10260 (2019)