Author of the publication

Directed proxy signature with fast revocation proven secure in the standard model.

, , , , and . IET Inf. Secur., 11 (3): 168-176 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compact and Cancelable Fingerprint Binary Codes Generation via One Permutation Hashing., , , , and . IEEE Signal Process. Lett., (2021)YoloMask: An Enhanced YOLO Model for Detection of Face Mask Wearing Normality, Irregularity and Spoofing., , , and . CCBR, volume 13628 of Lecture Notes in Computer Science, page 205-213. Springer, (2022)Attacks on a Universal Designated Verifier Signature Scheme., , and . IAS, page 27-30. IEEE Computer Society, (2009)Secure Communication Model of WSN Based on Secret Sharing., , , , and . CIS, page 483-487. IEEE Computer Society, (2010)Verification of Trusted Network Access Protocols in the Strand Space Model., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (3): 665-668 (2012)Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel., , , and . IEEE Access, (2019)Anonymous Communication in Wireless Mesh Network., , , and . CIS (2), page 416-420. IEEE Computer Society, (2009)978-0-7695-3931-7.Key Binding Based on Biometric Shielding Functions., , , and . IAS, page 19-22. IEEE Computer Society, (2009)ROSE: real one-stage effort to detect the fingerprint singular point based on multi-scale spatial attention., , , , , and . Signal Image Video Process., 16 (3): 669-676 (2022)Fingerprint Singular Point Detection Based on Multiple-Scale Orientation Entropy., , , , and . IEEE Signal Process. Lett., 18 (11): 679-682 (2011)