From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Threshold Attribute-Based Signcryption., , и . SCN, том 6280 из Lecture Notes in Computer Science, стр. 154-171. Springer, (2010)LoSt: location based storage., , , , и . CCSW, стр. 59-70. ACM, (2012)Privacy preserving EHR system using attribute-based infrastructure., , и . CCSW, стр. 47-52. ACM, (2010)Short Pairing-Efficient Threshold-Attribute-Based Signature., , и . Pairing, том 7708 из Lecture Notes in Computer Science, стр. 295-313. Springer, (2012)A Privacy Preserving E-Payment Scheme., , , и . IDC, том 237 из Studies in Computational Intelligence, стр. 197-202. Springer, (2009)Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption., , и . SECRYPT, стр. 306-311. INSTICC Press, (2008)A Provably Secure Multi-Receiver Identity-based Signcryption using Bilinear Maps., и . SECRYPT, стр. 305-308. INSTICC Press, (2007)E cient Identity-based Signcryption without Random Oracles., , и . AISC, том 125 из CRPIT, стр. 3-14. Australian Computer Society, (2012)Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption, ., , и . J. Networks, 4 (8): 687-697 (2009)Identity-based Signcryption without Random Oracles., , и . SECRYPT, стр. 342-347. INSTICC Press, (2008)