Author of the publication

E cient Identity-based Signcryption without Random Oracles.

, , and . AISC, volume 125 of CRPIT, page 3-14. Australian Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-based encryption and its applications using bilinear maps.. University of Melbourne, Australia, (2011)base-search.net (ftumelbourne:oai:minerva-access.unimelb.edu.au:11343/36841).E cient Identity-based Signcryption without Random Oracles., , and . AISC, volume 125 of CRPIT, page 3-14. Australian Computer Society, (2012)Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption, ., , and . J. Networks, 4 (8): 687-697 (2009)Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting., , , , , and . EVT/WOTE, USENIX Association, (2014)Identity-based Signcryption without Random Oracles., , and . SECRYPT, page 342-347. INSTICC Press, (2008)ZombieCoin: Powering Next-Generation Botnets with Bitcoin., , , and . Financial Cryptography Workshops, volume 8976 of Lecture Notes in Computer Science, page 34-48. Springer, (2015)Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption., , and . SECRYPT, page 306-311. INSTICC Press, (2008)