Author of the publication

A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model.

, , and . Information, 6 (4): 576-591 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model., , and . Information, 6 (4): 576-591 (2015)Solutions to the anti-piracy problem in oblivious transfer., , , and . J. Comput. Syst. Sci., 82 (3): 466-476 (2016)Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud., , , , and . Trans. Comput. Collect. Intell., (2015)Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards., and . NSS, volume 7873 of Lecture Notes in Computer Science, page 549-562. Springer, (2013)Server-Aided Verification Signatures with Privacy., and . EIDWT, page 414-421. IEEE Computer Society, (2013)New ID-Based Signatures without Trusted PKG., and . WKDD, page 589-593. IEEE Computer Society, (2008)A Distributed Storage Middleware Based on HBase and Redis., , and . ChineseCSCW, volume 1330 of Communications in Computer and Information Science, page 364-380. Springer, (2020)A joint energy-saving mechanism for M2M communications in LTE-based system., , and . WCNC, page 4706-4711. IEEE, (2013)Proxy Signature Scheme Based on Isomorphisms of Polynomials., and . NSS, volume 7645 of Lecture Notes in Computer Science, page 113-125. Springer, (2012)An Optimized Random Access Algorithm for MTC Users over Wireless Networks., , , and . VTC Spring, page 1-5. IEEE, (2013)