Author of the publication

Strongly secure identity-based authenticated key agreement protocols.

, , , and . Comput. Electr. Eng., 37 (2): 205-217 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Anonymous P2P Reputation System Based on Trusted Computing Technology., , , and . GLOBECOM, page 332-337. IEEE, (2007)Strongly secure identity-based authenticated key agreement protocols., , , and . Comput. Electr. Eng., 37 (2): 205-217 (2011)An alternative class of irreducible polynomials for optimal extension fields., , and . Des. Codes Cryptogr., 60 (2): 171-182 (2011)A New Structure of Blockchain to Simplify the Verification., , and . BlockSys, volume 1156 of Communications in Computer and Information Science, page 33-46. Springer, (2019)A challenge-response authentication for RFID using Enhanced-Trivium., , , and . SSIC, page 1-5. IEEE, (2016)Delegatability of an Identity Based Strong Designated Verifier Signature Scheme., , , and . Informatica, 21 (1): 117-122 (2010)Public-Key Encryption with Selective Opening Security from General Assumptions., , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 510-530. Springer, (2018)Speaker-Independent Lipreading By Disentangled Representation Learning., , and . ICIP, page 2493-2497. IEEE, (2021)Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings., , and . IMSCCS (2), page 135-141. IEEE Computer Society, (2006)0-7695-2581-4.Reputation-based Distributed Knowledge Sharing System in Blockchain., , , , and . MobiQuitous, page 476-481. ACM, (2018)