Author of the publication

Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability.

, , , and . WISM, volume 7529 of Lecture Notes in Computer Science, page 231-238. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiway dynamic mask attention networks for natural language inference., , , , and . J. Comput. Methods Sci. Eng., 21 (1): 151-162 (2021)Omnichannel operations with ship-from-store., and . Oper. Res. Lett., 48 (3): 257-261 (2020)EGIP: An efficient group identification protocol in roaming network., , , , and . IWCMC, page 1280-1284. IEEE, (2017)Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability., , , and . WISM, volume 7529 of Lecture Notes in Computer Science, page 231-238. Springer, (2012)Quick response and omnichannel retail operations with the ship-to-store program., and . ITOR, 27 (6): 3007-3030 (2020)A new hybrid method for nonlinear complementarity problems., , and . Comput. Optim. Appl., 49 (3): 493-520 (2011)Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security., , and . EIDWT, page 407-413. IEEE Computer Society, (2013)Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes., and . AINA, page 745-752. IEEE Computer Society, (2010)Bilinear-pairing based two-party identification protocol in wireless sensor network., , , , , and . WCSP, page 1-5. IEEE, (2016)Self-organizing multiobjective optimization based on decomposition with neighborhood ensemble., , , and . Neurocomputing, (2016)