Author of the publication

Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.

, , , , and . AsiaCCS, page 501-515. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applications of undeniable signature schemes., , , and . ICSIPA, page 133-138. IEEE, (2015)Lattice-Based Public Key Searchable Encryption from Experimental Perspectives., , and . IEEE Trans. Dependable Secur. Comput., 17 (6): 1269-1282 (2020)Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things., and . ACSAC, page 119-130. ACM, (2021)Notes on Two Flawed Attacks on Undeniable Signature Schemes., and . ICITCS, page 1-4. IEEE Computer Society, (2013)The insecurity of a certificateless undeniable signature scheme., and . IWCMC, page 582-587. IEEE, (2016)Cryptanalysis of a certificateless identification scheme., , , and . Secur. Commun. Networks, 8 (2): 122-125 (2015)Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT., , , and . CoRR, (2021)Fast Authentication from Aggregate Signatures with Improved Security., , and . IACR Cryptology ePrint Archive, (2018)Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme., , and . Mycrypt, volume 10311 of Lecture Notes in Computer Science, page 474-477. Springer, (2016)EW-Tune: A Framework for Privately Fine-Tuning Large Language Models with Differential Privacy., , , and . ICDM (Workshops), page 560-566. IEEE, (2022)