Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constant-round Dynamic Group Key Exchange from RLWE Assumption., , and . IACR Cryptology ePrint Archive, (2020)Defending RFID authentication protocols against DoS attacks., and . Comput. Commun., 34 (3): 384-390 (2011)Enhancements of authenticated multiple key exchange protocol based on bilinear pairings., , , and . Comput. Electr. Eng., 36 (1): 155-159 (2010)Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies., , and . IEICE Trans. Inf. Syst., 94-D (6): 1181-1184 (2011)Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security., , and . IEICE Trans. Commun., 94-B (8): 2235-2238 (2011)Cryptanalysis of Lee-Hwang-Li's key authentication scheme., and . Appl. Math. Comput., 161 (1): 101-107 (2005)Discrete logarithm based chameleon hashing and signatures without key exposure., , , , and . Comput. Electr. Eng., 37 (4): 614-623 (2011)Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems., , , , and . IACR Cryptology ePrint Archive, (2009)A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control., , and . IACR Cryptology ePrint Archive, (2009)Design and Implementation of Constant-Round Dynamic Group Key Exchange from RLWE., , , , , and . IEEE Access, (2020)