Author of the publication

Designated Verifier Proxy Signature Scheme.

, , and . IIH-MSP, page 235-238. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test., , , , , and . IEEE Access, (2018)Adaptive Robust Stabilization of a Flexible Timoshenko Manipulator., , , , , and . ICARM, page 565-569. IEEE, (2019)Improving Laplace Mechanism of Differential Privacy by Personalized Sampling., , , , , and . TrustCom, page 623-630. IEEE, (2020)the Connection between Cryptography and Differential Privacy: a Survey., , , and . CoRR, (2020)The Trust Management Model of Trusted Software., , , and . IFITA (3), page 534-537. IEEE Computer Society, (2009)Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud., , , and . IEEE Access, (2019)Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients., , , and . HPCC/DSS/SmartCity, page 816-823. IEEE, (2020)A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System., , , , and . IACR Cryptol. ePrint Arch., (2024)An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection., , , and . IEEE Access, (2019)Smart Health Records Sharing Scheme based on Partially Policy-Hidden CP-ABE with Leakage Resilience., , , , and . HPCC/DSS/SmartCity/DependSys, page 1408-1415. IEEE, (2022)