Author of the publication

Leakage resilient CCA secure IBE with all-but-one lossy filter.

. Int. J. Ad Hoc Ubiquitous Comput., 21 (4): 266-272 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ship detection for Radarsat-2 ScanSAR data using DoG scale-space., , , , , and . IGARSS, page 1881-1884. IEEE, (2013)Fuzzy games with communication networks., , , and . GAMENETS, page 1-4. IEEE, (2014)Vague color image enhancement on fractional differential and improved retinex., , , , and . Color Imaging: Displaying, Processing, Hardcopy, and Applications, volume 9395 of SPIE Proceedings, page 93950Q. SPIE, (2015)A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity.. Future Gener. Comput. Syst., (2018)Improved group key transfer protocols from the protocol of Harn et al.. Secur. Commun. Networks, 6 (12): 1471-1477 (2013)Multi-Sensor Registration in High-Precision CMM Based on a Composite Standard., , , , , , and . Sensors, 18 (4): 1220 (2018)A Resilient Power System Operation Strategy Considering Transmission Line Attacks., , , , , and . IEEE Access, (2018)Fast multicast scheme with secure network coding in cloud data centers., , , , , and . Comput. Sci. Inf. Syst., 13 (2): 531-545 (2016)Accurate Power Sharing and Synthetic Inertia Control for DC Building Microgrids With Guaranteed Performance., , , , , and . IEEE Access, (2019)CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency., and . ISC, volume 9290 of Lecture Notes in Computer Science, page 319-335. Springer, (2015)