Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)An Efficient Key-Evolving Signature Scheme Based on Pairing., and . FTDCS, page 68-73. IEEE Computer Society, (2004)Security Arguments for a Class of ID-based Signatures., , and . IACR Cryptology ePrint Archive, (2007)An Improved Algorithm for uP + vQ Using JSF13., , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 467-478. Springer, (2004)Collecting Internet Malware Based on Client-side Honeypot., , , , and . ICYCS, page 1493-1498. IEEE Computer Society, (2008)High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes., , , , and . WISE (2), volume 8787 of Lecture Notes in Computer Science, page 336-350. Springer, (2014)Proof of Forward Security for Password-based Authenticated Key Exchange., and . Int. J. Netw. Secur., 7 (3): 335-341 (2008)An Efficient ID-based Proxy Signature Scheme from Pairings., and . IACR Cryptology ePrint Archive, (2006)Universally Composable Three-Party Key Distribution., , , and . IACR Cryptology ePrint Archive, (2006)Self-Updating Hash Chains and Their Implementations., and . WISE, volume 4255 of Lecture Notes in Computer Science, page 387-397. Springer, (2006)