Author of the publication

Directed proxy signature with fast revocation proven secure in the standard model.

, , , , and . IET Inf. Secur., 11 (3): 168-176 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel., , , and . IEEE Access, (2019)Outflows and Bubbles in Taurus: Star-formation Feedback Sufficient to Maintain Turbulence, , , , , , , , and . (Jul 23, 2015)Research on Sentiment Analyzing in Multi-topics Texts., , and . CSISE (2), volume 105 of Advances in Intelligent and Soft Computing, page 581-586. Springer, (2011)Key Binding Based on Biometric Shielding Functions., , , and . IAS, page 19-22. IEEE Computer Society, (2009)An exploratory case study on IS implementation and organizational change in China., , and . ECIS, page 1062-1072. (2003)Secure Communication Model of WSN Based on Secret Sharing., , , , and . CIS, page 483-487. IEEE Computer Society, (2010)A Novel Biometric-Based Authentication Scheme with Privacy Protection., and . IAS, page 295-298. IEEE Computer Society, (2009)A Novel Hash-based RFID Mutual Authentication Protocol., , , and . CIS, page 774-778. IEEE Computer Society, (2011)Directed proxy signature with fast revocation proven secure in the standard model., , , , and . IET Inf. Secur., 11 (3): 168-176 (2017)Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings., , , and . IEEE Access, (2018)