Autor der Publikation

Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes.

, , und . NaNA, Seite 278-281. IEEE, (2021)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Other publications of authors with the same name

On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme., and . INCoS, page 571-576. IEEE, (2012)On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing., and . 3PGCIC, volume 1 of Lecture Notes on Data Engineering and Communications Technologies, page 405-413. Springer, (2016)An Improved Data Integrity Verification Scheme for Cloud Storage., , , , , and . INCoS, volume 182 of Lecture Notes on Data Engineering and Communications Technologies, page 393-401. Springer, (2023)Yet Another Way to Construct Digital Signature in the Standard Model., and . INCoS, page 430-433. IEEE, (2013)Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation., , , , and . J. Ambient Intell. Humaniz. Comput., 10 (2): 429-438 (2019)On the Security of a Cloud Data Storage Auditing Protocol IPAD., , , and . EIDWT, volume 6 of Lecture Notes on Data Engineering and Communications Technologies, page 611-617. Springer, (2017)Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme., and . INCoS, page 581-586. IEEE, (2012)Differential privacy distributed learning under chaotic quantum particle swarm optimization., , , and . Computing, 103 (3): 449-472 (2021)Improved publicly verifiable auditing protocol for cloud storage., , , , , and . Concurr. Comput. Pract. Exp., (2021)Data Owner Based Attribute Based Encryption., , and . INCoS, page 144-148. IEEE, (2015)