Author of the publication

Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks.

, , , , and . PST, page 109-120. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving CACTUS Algorithm for Clustering over Vertically Partitioned Databases., and . DMIN, page 308-314. CSREA Press, (2007)Weighted Independent Perfect Domination on Cocomparability Graphs., , and . Discret. Appl. Math., 63 (3): 215-222 (1995)Alternative Protocols for Generalized Oblivious Transfer., , and . ICDCN, volume 4904 of Lecture Notes in Computer Science, page 304-309. Springer, (2008)On Optimal Probabilistic Asynchronous Byzantine Agreement., and . ICDCN, volume 4904 of Lecture Notes in Computer Science, page 86-98. Springer, (2008)A note on the Certificateless Multi-receiver Signcryption Scheme., , and . IACR Cryptology ePrint Archive, (2009)A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers., , and . IACR Cryptology ePrint Archive, (2016)Compact CCA-Secure Encryption with Ciphertext Verifiability., , and . IACR Cryptology ePrint Archive, (2011)Foundations of Group Key Management - Framework, Security Model and a Generic Construction., , , and . IACR Cryptology ePrint Archive, (2008)Brief announcement: communication efficient asynchronous byzantine agreement., and . PODC, page 243-244. ACM, (2010)Brief announcement: on the round complexity of distributed consensus over synchronous networks., , , , and . PODC, page 397. ACM, (2004)