Author of the publication

On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings.

. ISPEC, volume 5451 of Lecture Notes in Computer Science, page 47-58. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Proxy Signature Scheme with Full-delegation., and . ICNSC, page 513-518. IEEE, (2008)Comment on Anonymous Multi-receiver Identity-Based Encryption Scheme., and . INCoS, page 473-476. IEEE, (2012)On the Security of a Data Integrity Auditing Scheme in Mobile Multi-cloud Environment., , and . ICCSP, page 40-44. ACM, (2018)On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings.. ISPEC, volume 5451 of Lecture Notes in Computer Science, page 47-58. Springer, (2009)Security Analysis of Two Signature Schemes and Their Improved Schemes., and . ICCSA (1), volume 4705 of Lecture Notes in Computer Science, page 589-602. Springer, (2007)An Improved Group Signature Scheme., , and . TrustBus, volume 3592 of Lecture Notes in Computer Science, page 185-194. Springer, (2005)Efficient public verification proof of retrievability scheme in cloud., , and . Clust. Comput., 17 (4): 1401-1411 (2014)Recognizing Chaos by Deep Learning and Transfer Learning on Recurrence Plots., , , , , and . Int. J. Bifurc. Chaos, 33 (10): 2350116:1-2350116:13 (August 2023)Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing., , , and . Secur. Commun. Networks, (2021)Achieving public verifiability and data dynamics for cloud data in the standard model., , and . Clust. Comput., 20 (3): 2641-2653 (2017)