Author of the publication

A Secure Network Storage System with Information Privacy.

, , and . WEWoRC, volume P-74 of LNI, page 22-31. GI, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks., , , , , and . PIMRC, page 1-5. IEEE, (2006)On Verifiable Implicit Asking Protocols for RSA Computation., , , and . AUSCRYPT, volume 718 of Lecture Notes in Computer Science, page 296-307. Springer, (1992)Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis., , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 193-207. Springer, (2001)A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures., , and . ISW, volume 1729 of Lecture Notes in Computer Science, page 259-270. Springer, (1999)Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE., , , and . Int. J. Netw. Secur., 16 (1): 19-28 (2014)Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes., and . IMACC, volume 5921 of Lecture Notes in Computer Science, page 278-300. Springer, (2009)On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses., , and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 461-480. Springer, (1989)A security framework for personal networks., , and . COMSWARE, page 682-690. IEEE, (2008)Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications., , and . AAECC, volume 1719 of Lecture Notes in Computer Science, page 282-293. Springer, (1999)Reduced complexity iterative decoding of low-density parity check codes based on belief propagation., , and . IEEE Trans. Commun., 47 (5): 673-680 (1999)