Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active Attacking Multicast Key Management Protocol Using Alloy., and . ABZ, volume 7316 of Lecture Notes in Computer Science, page 164-177. Springer, (2012)Oblivious Polynomial Evaluation., , , and . J. Comput. Sci. Technol., 19 (4): 550-554 (2004)Verifiable Attribute-based Encryption., and . IACR Cryptology ePrint Archive, (2007)A New Trust Chain Security Evaluation Model and Tool., , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 382-391. Springer, (2014)Efficient Anonymous Electronic Metering Scheme., and . AMT, volume 138 of Frontiers in Artificial Intelligence and Applications, page 327-330. IOS Press, (2006)Verifiable Attribute Based Encryption., and . Int. J. Netw. Secur., 10 (2): 114-120 (2010)Fault-tolerate Multiparty Electronic Contract Signing Protocol., and . AMT, volume 138 of Frontiers in Artificial Intelligence and Applications, page 79-85. IOS Press, (2006)Formal Analysis of Dynamic Domain Establishment Protocol in Cloud Logging Service., and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 24-38. Springer, (2013)Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol., and . FORTE, volume 5048 of Lecture Notes in Computer Science, page 305-323. Springer, (2008)Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short Paper)., , and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 56-66. Springer, (2017)