Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 612-621. Springer, (2014)Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption., , , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 592-609. Springer, (2013)Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant., , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 545-555. Springer, (2006)Wearable Ankle Robots in Post-stroke Rehabilitation of Gait: A Systematic Review., , , , , , , and . Frontiers Neurorobotics, (2019)Attack on an ID-based authenticated group key agreement scheme from PKC 2004., and . Inf. Process. Lett., 91 (4): 191-193 (2004)Generic security-amplifying methods of ordinary digital signatures., , , , and . Inf. Sci., (2012)Privacy-preserving and verifiable online crowdsourcing with worker updates., , , and . Inf. Sci., (2021)Identity-based chameleon hashing and signatures without key exposure., , , , , and . Inf. Sci., (2014)A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem., , , , and . IEEE Internet Things J., 6 (6): 10251-10260 (2019)Blockchain-Based Dynamic Provable Data Possession for Smart Cities., , , , , and . IEEE Internet Things J., 7 (5): 4143-4154 (2020)