Author of the publication

Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing.

, , , and . Secur. Commun. Networks, 6 (7): 881-888 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Research and Outlook for Keyword-Based Searchable Encryption in Cloud Storage., , , , , and . J. Commun., 10 (10): 766-772 (2015)The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment., , , , , and . KSII Trans. Internet Inf. Syst., 6 (1): 131-146 (2012)Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme., , , , and . J. Networks, 6 (11): 1557-1564 (2011)An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering., , , and . J. Networks, 8 (3): 672-679 (2013)Trend Analysis and Countermeasure Research of DDoS Attack Under 5G Network., , and . CSP, page 153-160. IEEE, (2021)A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment., , and . Symmetry, 12 (1): 150 (2020)A Survey on Green Computing Based on Cloud Environment., , , , and . Int. J. Online Eng., 9 (3): 27-33 (2013)An Improved Dynamic Password based Group Key Agreement against Dictionary Attack., , , , and . J. Softw., 7 (7): 1524-1530 (2012)The efficiency improved scheme for secure access control of digital video distribution., , , , and . Multim. Tools Appl., 75 (20): 12645-12662 (2016)Analysis and Enhancement of Three Identity-based Signcryption Protocols., , , , and . J. Comput., 7 (4): 1006-1013 (2012)