Author of the publication

Group key establishment (GKE): Two/three party key exchange to GKE.

, , , and . IEEE ANTS, page 61-66. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving CACTUS Algorithm for Clustering over Vertically Partitioned Databases., and . DMIN, page 308-314. CSREA Press, (2007)A note on the Certificateless Multi-receiver Signcryption Scheme., , and . IACR Cryptology ePrint Archive, (2009)Compact CCA-Secure Encryption with Ciphertext Verifiability., , and . IACR Cryptology ePrint Archive, (2011)Foundations of Group Key Management - Framework, Security Model and a Generic Construction., , , and . IACR Cryptology ePrint Archive, (2008)A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers., , and . IACR Cryptology ePrint Archive, (2016)Brief announcement: communication efficient asynchronous byzantine agreement., and . PODC, page 243-244. ACM, (2010)Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 564-575. Springer, (2014)A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs., , and . WALCOM, volume 6552 of Lecture Notes in Computer Science, page 191-201. Springer, (2011)Core and Conditional Core Path of Specified Length in Special Classes of Graphs., , and . WALCOM, volume 5431 of Lecture Notes in Computer Science, page 262-273. Springer, (2009)Breaking and Fixing of an Identity Based Multi-Signcryption Scheme., , and . ProvSec, volume 5848 of Lecture Notes in Computer Science, page 61-75. Springer, (2009)