Author of the publication

Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme.

, , , and . ICETE (Selected Papers), volume 314 of Communications in Computer and Information Science, page 233-248. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme., , and . WWW (Posters), (2003)Design of Intrusion Detection System at User Level with System-Call Interposing., and . ICETE (2), page 263-268. INSTICC Press, (2004)A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository., and . IWAP, volume 128 of Frontiers in Artificial Intelligence and Applications, page 155-168. IOS Press, (2005)On zero-knowledge proofs (extended abstract): "from membership to decision"., , and . STOC, page 255-264. ACM, (2000)A proposal for the privacy leakage verification tool for Android application developers., and . ICUIMC, page 54. ACM, (2013)Efficient Shortest Path Routing Algorithms for Distributed XML Processing., , , and . WEBIST, page 265-272. ScitePress, (2019)Computational experimental evaluation of the time variance of cryptocurrency mining using cryptographic hash functions., and . BIOTC, page 54-61. ACM, (2022)An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS., , , and . CANDAR, page 239-244. IEEE, (2019)Preventing the Access of Fraudulent WEB Sites by Using a Special Two-Dimensional Code., and . IMIS, page 645-650. IEEE Computer Society, (2012)Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs., , and . IMIS, page 660-664. IEEE Computer Society, (2012)