Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minimal logarithmic signatures for the unitary group Un(q)., , and . Des. Codes Cryptogr., 77 (1): 179-191 (2015)An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems., , , and . INCoS, page 199-202. IEEE, (2016)Quantifying team precedence in the game of cricket., , , , , and . Clust. Comput., 21 (1): 523-537 (2018)CSP-DHIES: a new public-key encryption scheme from matrix conjugation., , , , and . Secur. Commun. Networks, 5 (7): 809-822 (2012)A Data Sharing Scheme Based on Federated Learning in IoV., , , , and . IEEE Trans. Veh. Technol., 72 (9): 11644-11656 (September 2023): An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks., , , , and . IEEE Trans. Veh. Technol., 60 (2): 580-591 (2011)More Efficient Cryptosystems From k-th Power Residues., , , and . IACR Cryptology ePrint Archive, (2013)Efficient ID-based Threshold Signature Schemes without Pairings., , and . IACR Cryptology ePrint Archive, (2006)CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite., , and . IACR Cryptology ePrint Archive, (2017)Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks., , , , and . IJDSN, (2013)