Author of the publication

On the Security of a Certificateless Searchable Public Key Encryption Scheme.

, , , , and . ICGEC, volume 536 of Advances in Intelligent Systems and Computing, page 113-119. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks., , , , , , and . IET Networks, 9 (6): 290-297 (2020)A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices., , and . COMPSAC (2), page 700-710. IEEE Computer Society, (2007)978-0-7695-2870-0.Comments on a privacy preserving public auditing mechanism for shared cloud data., , , , , and . MISNC, page 48:1-48:6. ACM, (2017)Construct Left Ventricular Hypertrophy Prediction Model Based on Random Forest., , , and . IIH-MSP (1), volume 109 of Smart Innovation, Systems and Technologies, page 142-150. Springer, (2018)A pairing-based publicly verifiable secret sharing scheme., and . J. Systems Science & Complexity, 24 (1): 186-194 (2011)A New Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol., , , and . J. Inf. Hiding Multim. Signal Process., 9 (6): 1595-1602 (2018)Video salient region detection model based on wavelet transform and feature comparison., , and . EURASIP J. Image Video Process., (2019)Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems., , , and . IEEE Access, (2017)Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications., , , , and . ICGEC, volume 579 of Advances in Intelligent Systems and Computing, page 191-198. Springer, (2017)Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme., , , , and . ICGEC, volume 579 of Advances in Intelligent Systems and Computing, page 199-205. Springer, (2017)