Author of the publication

LaRRS: Lattice-Based Revocable Ring Signature and Its Application for VANETs.

, , , , , and . IEEE Trans. Veh. Technol., 73 (1): 739-753 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Optimistic Fair Protocol for P2P Chained Transaction., , and . ASIAN, volume 3818 of Lecture Notes in Computer Science, page 136-145. Springer, (2005)Building Trusted Sub-domain for the Grid with Trusted Computing., , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 463-471. Springer, (2007)A pre-silicon logic level security verification flow for higher-order masking schemes against glitches on FPGAs., , , and . Integr., (2020)A Secure Multi-party Computing Model Based on Trusted Computing Platform., , and . CIT (2), page 318-322. IEEE Computer Society, (2009)978-0-7695-3836-5.On the degree of homogeneous bent functions., , , and . Discret. Appl. Math., 155 (5): 665-669 (2007)An Improved Global Trust Value Computing Method in P2P System., , , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 258-267. Springer, (2006)Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions., , and . ProvSec, volume 14217 of Lecture Notes in Computer Science, page 186-206. Springer, (2023)Certificateless One-Way Authenticated Two-Party Key Agreement Protocol., , , , and . IAS, page 483-486. IEEE Computer Society, (2009)VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach., , , and . WKDD, page 594-600. IEEE Computer Society, (2008)The Simplified Inductive Approach to Verifying Security Protocols., , and . ISECS, page 523-526. IEEE Computer Society, (2008)