Author of the publication

Efficient and Identity-based Signcryption with Provably-secure.

, , and . J. Digit. Content Technol. its Appl., 4 (7): 148-153 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Algorithms for Secure Outsourcing of Modular Exponentiations., , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 541-556. Springer, (2012)Continuous Authentication for the Internet of Things Using Channel State Information., , and . GLOBECOM, page 1-6. IEEE, (2019)Publicly verifiable database scheme with efficient keyword search., , , and . Inf. Sci., (2019)On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services., , and . IEEE Syst. J., 12 (2): 2039-2042 (2018)TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain., , , , and . IEEE Trans. Veh. Technol., 69 (6): 5784-5798 (2020)Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation., , , , , and . IEEE Trans. Serv. Comput., 16 (6): 3999-4011 (November 2023)Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks., , , , and . IEEE Trans. Serv. Comput., 16 (3): 2114-2125 (May 2023)A fair data access control towards rational users in cloud storage., , , , and . Inf. Sci., (2017)Practical Secret Sharing Scheme Realizing Generalized Adversary Structure., and . J. Comput. Sci. Technol., 19 (4): 564-569 (2004)Efficient and Identity-based Signcryption with Provably-secure., , and . J. Digit. Content Technol. its Appl., 4 (7): 148-153 (2010)