Author of the publication

Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model.

, , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 239-253. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Sizes of Diffuse Ly$\alpha$ Nebulae around Star-Forming Galaxies at High Redshift, , , , , , , , and . (2016)cite arxiv:1611.03510Comment: Resubmitted to ApJ after the referee's comments.A new audio steganalysis method based on linear prediction., , , and . Multimedia Tools Appl., 77 (12): 15431-15455 (2018)Efficient keyword search for public-key setting., and . MILCOM, page 1236-1241. IEEE, (2015)Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model., , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 239-253. (2016)Information-Assisted Density Peak Index for Hyperspectral Band Selection., , and . IEEE Geosci. Remote. Sens. Lett., 14 (10): 1870-1874 (2017)Security Analysis of User Efficient Blind Signatures., , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 167-172. Springer, (2004)Improved Privacy-Protecting Proxy Signature Scheme., , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 208-213. Springer, (2004)Searchable Encryption for Healthcare Clouds: A Survey., , and . IEEE Trans. Serv. Comput., 11 (6): 978-996 (2018)Security and Privacy for Healthcare Blockchains., , and . IEEE Trans. Serv. Comput., 15 (6): 3668-3686 (2022)A hybrid machine learning approach for hypertension risk prediction., , , , , , and . Neural Comput. Appl., 35 (20): 14487-14497 (July 2023)