Author of the publication

Directed proxy signature with fast revocation proven secure in the standard model.

, , , , and . IET Inf. Secur., 11 (3): 168-176 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and secure certificateless signature scheme in the standard model., , , , and . Int. J. Commun. Syst., (2017)Anonymous multi-receiver ID-based signcryption scheme., , , and . IET Inf. Secur., 9 (3): 194-201 (2015)Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme with Sender Traceability., , and . J. Inf. Secur. Appl., (2022)nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness., and . Comput. Informatics, 32 (3): 441-460 (2013)Improved multicast key management of Chinese wireless local area network security standard., , and . IET Commun., 6 (9): 1126-1130 (2012)Secure Communication Model of WSN Based on Secret Sharing., , , , and . CIS, page 483-487. IEEE Computer Society, (2010)Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model., , , and . Int. J. Distributed Sens. Networks, 12 (1): 3205206:1-3205206:12 (2016)A Novel Biometric-Based Authentication Scheme with Privacy Protection., and . IAS, page 295-298. IEEE Computer Society, (2009)A Novel Hash-based RFID Mutual Authentication Protocol., , , and . CIS, page 774-778. IEEE Computer Society, (2011)Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme., and . IET Inf. Secur., 8 (1): 8-11 (2014)