Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 564-575. Springer, (2014)A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems., and . Comput. J., 67 (4): 1531-1537 (2024)ID-Based Threshold Signcryption and Group Unsigncryption., , and . SNDS, volume 335 of Communications in Computer and Information Science, page 35-44. Springer, (2012)Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 542-553. Springer, (2014)An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks., , , and . IACR Cryptology ePrint Archive, (2015)Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext., , and . J. Internet Serv. Inf. Secur., 3 (1/2): 5-19 (2013)Lattice Based Universal Re-encryption for Mixnet., , and . J. Internet Serv. Inf. Secur., 4 (1): 1-11 (2014)Efficient Lattice based (H)IB-DRE., , , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 13 (4): 1-23 (2022)Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation., , and . J. High Speed Networks, 27 (1): 67-82 (2021)Lattice Based Identity Based Proxy Re-Encryption Scheme., , and . J. Internet Serv. Inf. Secur., 3 (3/4): 38-51 (2013)