Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient certificateless aggregate signature with constant pairing computations., , , and . Inf. Sci., (2013)Privacy-Preserving English Auction Protocol with Round Efficiency, and . CoRR, (2010)Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (1): 256-258 (2012)Strength Analysis of the Main Structural Component in Ship-to-Shore Cranes Under Dynamic Load., , , and . IEEE Access, (2019)Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things., , , and . IACR Cryptol. ePrint Arch., (2020)Hierarchical Distributed Coordination for Economic Dispatch., , , , , and . ISIE, page 1149-1154. IEEE, (2018)Security and Privacy in IoT-Cloud-Based e-Health Systems - A Comprehensive Review., , and . Symmetry, 12 (7): 1191 (2020)Guest editorial: Introduction to the special section on sustainable security solutions for Internet of Vehicles (VSI-iov)., , and . Comput. Electr. Eng., (2022)An Anonymous Authentication Protocol With Delegation and Revocation for Content Delivery Networks., , , , , and . IEEE Syst. J., 16 (3): 4118-4129 (2022)A Novel Multiserver Authentication Scheme Using Proxy Resignature With Scalability and Strong User Anonymity., , , , , and . IEEE Syst. J., 15 (2): 2156-2167 (2021)