Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-Based Authenticated Asymmetric Group Key Agreement Protocol., , , and . COCOON, volume 6196 of Lecture Notes in Computer Science, page 510-519. Springer, (2010)Simulated radiation characteristics of frozen soil surface at typical microwave bands., , , and . IGARSS, page 4310-4313. IEEE, (2004)Online/Offline Provable Data Possession., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (5): 1182-1194 (2017)Cecoin: A decentralized PKI mitigating MitM attacks., , , , , and . Future Gener. Comput. Syst., (2020)Securing messaging services through efficient signcryption with designated equality test., , , , , and . Inf. Sci., (2019)Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security., , , , and . Inf. Sci., (2014)Practical secure and privacy-preserving scheme for value-added applications in VANETs., , , , and . Comput. Commun., (2015)Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing., , , and . KSII Trans. Internet Inf. Syst., 14 (1): 281-298 (2020)Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response., , , , and . IEEE Trans. Computers, 65 (8): 2562-2574 (2016)Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts., , , , , and . IEEE Trans. Computers, 65 (2): 466-479 (2016)