Author of the publication

Guest Editorial: Special Issue on Cyber Security Protections and Applications.

, , and . J. Internet Serv. Inf. Secur., 4 (2): 1-3 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptively Secure Efficient Lattice (H)IBE in Standard Model with Short Public Parameters., , and . SPACE, volume 7644 of Lecture Notes in Computer Science, page 153-172. Springer, (2012)Lattice Forward-Secure Identity Based Encryption Scheme., , and . J. Internet Serv. Inf. Secur., 2 (3/4): 118-128 (2012)Lattice Based Mix Network for Location Privacy in Mobile System., , and . Mob. Inf. Syst., (2015)Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 564-575. Springer, (2014)Lattice-based identity-based resplittable threshold public key encryption scheme., , and . Int. J. Comput. Math., 93 (2): 289-307 (2016)Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext., , and . J. Internet Serv. Inf. Secur., 3 (1/2): 5-19 (2013)Lattice Based Universal Re-encryption for Mixnet., , and . J. Internet Serv. Inf. Secur., 4 (1): 1-11 (2014)Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 542-553. Springer, (2014)Lattice Based Identity Based Proxy Re-Encryption Scheme., , and . J. Internet Serv. Inf. Secur., 3 (3/4): 38-51 (2013)Guest Editorial: Special Issue on Cyber Security Protections and Applications., , and . J. Internet Serv. Inf. Secur., 4 (2): 1-3 (2014)