Author of the publication

Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.

, , , , and . WISA, volume 5379 of Lecture Notes in Computer Science, page 115-129. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demand Prediction and Placement Optimization for Electric Vehicle Charging Stations., , , , , and . IJCAI, page 3117-3123. IJCAI/AAAI Press, (2016)Impact of information in a simple multiagent collaborative task., , , and . CDC, page 4543-4548. IEEE, (2015)On the Provable Security of Multi-Receiver Signcryption Schemes., , , , and . IACR Cryptology ePrint Archive, (2008)Some asymptotic properties of the Erlang-C formula in many-server limiting regimes., and . Oper. Res. Lett., (2024)Dispatching to incentivize fast service in multi-server queues., , and . SIGMETRICS Perform. Evaluation Rev., 39 (3): 43-45 (2011)Managing Overstaying Electric Vehicles in Park-and-Charge Facilities., , and . IJCAI, page 2465-2471. IJCAI/AAAI Press, (2016)Characterizing Distribution Rules for Cost Sharing Games.. California Institute of Technology, USA, (2013)Routing and staffing when servers are strategic., , , and . EC, page 713-714. ACM, (2014)Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme., , , , and . WISA, volume 5379 of Lecture Notes in Computer Science, page 115-129. Springer, (2008)Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks., , , , and . PST, page 109-120. IEEE Computer Society, (2008)