Author of the publication

New Algorithms for Secure Outsourcing of Modular Exponentiations.

, , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 541-556. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SRDPV: secure route discovery and privacy-preserving verification in MANETs., , and . Wireless Networks, 25 (4): 1731-1747 (2019)Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks., , , , , and . ICC, page 1-6. IEEE, (2019)Measurement on the border effect of transboundary water resources: A case study of China's Zhanghe basin., , , and . SMC, page 1928-1934. IEEE, (2014)Practical Secret Sharing Scheme Realizing Generalized Adversary Structure., and . J. Comput. Sci. Technol., 19 (4): 564-569 (2004)Efficient and Identity-based Signcryption with Provably-secure., , and . J. Digit. Content Technol. its Appl., 4 (7): 148-153 (2010)Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET., , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (11): 13108-13122 (November 2023)An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment., , , and . IEICE Trans. Inf. Syst., 93-D (3): 430-437 (2010)Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems., , , , , , and . IEEE Syst. J., 16 (2): 3096-3107 (2022)New Algorithms for Secure Outsourcing of Modular Exponentiations., , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 541-556. Springer, (2012)Continuous Authentication for the Internet of Things Using Channel State Information., , and . GLOBECOM, page 1-6. IEEE, (2019)