Author of the publication

The ring authenticated encryption scheme - How to provide a clue wisely.

, , , and . Inf. Sci., 179 (1-2): 161-168 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The phases of large networks with edge and triangle constraints., , , and . CoRR, (2017)Security and Cloud Outsourcing Framework for Economic Dispatch., , , and . IEEE Trans. Smart Grid, 9 (6): 5810-5819 (2018)A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control., , and . IACR Cryptology ePrint Archive, (2009)Privacy-Preserving Public Auditing for Secure Cloud Storage., , , , and . IACR Cryptology ePrint Archive, (2009)PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones., , , , , and . IACR Cryptology ePrint Archive, (2013)Separability of the Kernel Function in an Integral Formulation for the Anisotropic Radiative Transfer Equation., , and . SIAM J. Math. Anal., 53 (5): 5613-5645 (2021)Reliable Multi-Factor User Authentication With One Single Finger Swipe., , , , , and . IEEE/ACM Trans. Netw., 31 (3): 1117-1131 (June 2023)Detection and Mitigation of DoS Attacks in Software Defined Networks., , , , , and . IEEE/ACM Trans. Netw., 28 (3): 1419-1433 (2020)PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks., , , and . IEEE Trans. Parallel Distributed Syst., 21 (2): 203-215 (2010)Securing emerging short range wireless communications: the state of the art., , , and . IEEE Wirel. Commun., 21 (6): 153-159 (2014)