Author of the publication

Non-interactive Deniable Authentication Protocols.

, , and . Inscrypt, volume 7537 of Lecture Notes in Computer Science, page 142-159. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2019)A research on new public-key encryption schemes., , and . Appl. Math. Comput., 169 (1): 51-61 (2005)Identity-and-data privacy forward security public auditing protocol in the standard model., and . Int. J. Commun. Syst., (2019)An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability., , , , , and . IMIS, page 81-88. IEEE Computer Society, (2012)A hybrid news recommendation algorithm based on user's browsing path., and . ICIS, page 1-4. IEEE Computer Society, (2016)Improved Protocol of Yao's Millionaires Problem., , , and . ICIS, page 229-232. IEEE, (2022)Short Group Signatures Without Random Oracles., , , , , and . J. Comput. Sci. Technol., 22 (6): 805-821 (2007)A non-delegatable strong designated verifier signature in ID-based setting for mobile environment., , , , , and . Math. Comput. Model., 58 (5-6): 1289-1300 (2013)Non-interactive Deniable Authentication Protocols., , and . Inscrypt, volume 7537 of Lecture Notes in Computer Science, page 142-159. Springer, (2011)Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences., , , and . Appl. Math. Comput., 171 (2): 900-911 (2005)