Author of the publication

Identity-Based Proxy Re-encryption Without Random Oracles.

, and . ISC, volume 4779 of Lecture Notes in Computer Science, page 189-202. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries., and . IACR Cryptology ePrint Archive, (2004)A Threshold GQ Signature Scheme., , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 137-150. Springer, (2003)Efficient Large-Scale Distributed Key Generation against Burst Interruption., , and . SECRYPT, page 197-203. INSTICC Press, (2007)A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring., , , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 544-560. Springer, (2012)Effective Botnet Detection Through Neural Networks on Convolutional Features., , and . TrustCom/BigDataSE, page 372-378. IEEE, (2018)A Framework of High Confidence E-Healthcare Information System., , , , and . ICWI, page 493-500. IADIS, (2003)New Secure Broadcasting Scheme Realizing Information Granularity., , , and . J. Inf. Sci. Eng., 26 (4): 1509-1523 (2010)Learning String Patterns and Tree Patterns from Examples., , and . ML, page 384-391. Morgan Kaufmann, (1990)Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems., and . SERE, page 187-195. IEEE, (2014)A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares., and . Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, page 207-224. Springer, (2001)