Author of the publication

Introducing proxy zero-knowledge proof and utilization in anonymous credential systems.

, , , and . Secur. Commun. Networks, 6 (2): 161-172 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication., , and . ISC Int. J. Inf. Secur., 12 (2): 101-111 (2020)GSL-AKA: Group-based Secure Lightweight Authentication and Key Agreement Protocol for M2M Communication., , and . IST, page 275-280. IEEE, (2018)A new universal test for bit strings., and . ACISP, volume 1172 of Lecture Notes in Computer Science, page 311-319. Springer, (1996)A Bit-Vector Differential Model for the Modular Addition by a Constant., , , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 385-414. Springer, (2020)Identity based universal re-encryption for mix nets., , and . ISCISC, page 1-5. IEEE, (2013)Analysis and Improvement of the SPACF Scheme in Vehicular Ad-hoc Networks., , , , and . ISCISC, page 68-74. IEEE, (2021)New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature., , and . Security and Management, page 238-242. CSREA Press, (2008)An Efficient and Physically Secure Privacy-Preserving Authentication Scheme for Vehicular Ad-hoc NETworks (VANETs)., , , , and . IEEE Access, (2022)Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks., , , and . Comput. Commun., (November 2023)A Bit-Vector Differential Model for the Modular Addition by a Constant and its Applications to Differential and Impossible-Differential Cryptanalysis., , , , , and . IACR Cryptol. ePrint Arch., (2022)