From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scalable Compilers for Group Key Establishment : Two/Three Party to Group., , , и . IACR Cryptology ePrint Archive, (2009)An Efficient Identity-Based Signcryption Scheme for Multiple Receivers., , , и . IACR Cryptology ePrint Archive, (2008)Security Weaknesses in Two Certificateless Signcryption Schemes., , и . IACR Cryptology ePrint Archive, (2010)On the Security of ID Based Signcryption Schemes., , , и . IACR Cryptology ePrint Archive, (2011)CCA2 Secure Certificateless Encryption Schemes Based on RSA., , и . IACR Cryptology ePrint Archive, (2010)An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing., , и . ProvSec, том 10592 из Lecture Notes in Computer Science, стр. 413-433. Springer, (2017)Efficient and Provably Secure Certificateless Multi-receiver Signcryption., , , и . ProvSec, том 5324 из Lecture Notes in Computer Science, стр. 52-67. Springer, (2008)Identity Based Public Verifiable Signcryption Scheme., , и . ProvSec, том 6402 из Lecture Notes in Computer Science, стр. 244-260. Springer, (2010)Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing., , и . Inscrypt, том 6151 из Lecture Notes in Computer Science, стр. 75-92. Springer, (2009)Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme., , , , и . WISA, том 5379 из Lecture Notes in Computer Science, стр. 115-129. Springer, (2008)