Author of the publication

An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.

, , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 373-384. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Provably Secure Certificate Based Ring Signature Without Pairing., , and . Int. J. Netw. Secur., 16 (4): 278-285 (2014)Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information., , and . Quantum Inf. Process., 19 (8): 233 (2020)A group key agreement protocol based on ECDH and short signature., , , and . J. Inf. Secur. Appl., (2023)Provably Secure Identity-Based Threshold Unsigncryption Scheme., , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 114-122. Springer, (2007)Deniable Proxy-Anonymous Signatures., , and . ICYCS, page 2131-2136. IEEE Computer Society, (2008)A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing., , , , and . J. Syst. Archit., (September 2023)Traffic data extraction and labeling for machine learning based attack detection in IoT networks., , and . Int. J. Mach. Learn. Cybern., 14 (7): 2317-2332 (July 2023)Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage., , , , and . J. Syst. Archit., (2024)A new construction of public key authenticated encryption with keyword search based on LWE., , , , and . Telecommun. Syst., 86 (2): 229-240 (June 2024)An Identity-Based Restricted Deniable Authentication Protocol., , and . ISPA, page 474-478. IEEE Computer Society, (2009)