Author of the publication

New identity-based society oriented signature schemes from pairings on elliptic curves.

, , , and . Appl. Math. Comput., 160 (1): 245-260 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ID-Based Structured Mulitsignature Schemes., , and . Network Security, volume 206 of IFIP Conference Proceedings, page 45-59. Kluwer, (2001)Cryptanalysis on Schwartz Graphical Encryption Method., , and . Cryptologia, 17 (3): 301-304 (1993)Securing on-line credit card payments without disclosing privacy information., , and . Comput. Stand. Interfaces, 25 (2): 119-129 (2003)A Fair and Privacy-preserved Protocol for Sealed Bid Auctions., and . Electron. Mark., 11 (3): 163-170 (2001)Scheduling with Sufficient Loosely Coupled Processors., , and . J. Parallel Distributed Comput., 9 (1): 87-92 (1990)Distributed assignment of cryptographic keys for access control in a hierarchy., , and . Comput. Secur., 13 (1): 79-84 (1994)A conventional approach to secret balloting in computer networks.. Comput. Secur., 15 (3): 249-262 (1996)Controlling Decryption of Personal Health Records in the Cloud., and . ICITCS, volume 120 of Lecture Notes in Electrical Engineering, page 69-79. Springer, (2011)Greater protection for credit card holders: a revised SET protocol., and . Comput. Stand. Interfaces, 19 (1): 1-8 (1998)A trustworthy Internet auction model with verifiable fairness., and . Internet Res., 11 (2): 159-166 (2001)