Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Lightweight Anonymous Entity Authentication for IoT Applications., , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 265-280. Springer, (2016)A Privacy Preserving Rental System., and . ISC, volume 3650 of Lecture Notes in Computer Science, page 59-73. Springer, (2005)Security Analysis and Improvement of the Global Key Recovery System., , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 17-24. Springer, (2002)Practical private data matching deterrent to spoofing attacks., , and . CIKM, page 852-853. ACM, (2006)A Lightweight Fast Handover Authentication Scheme in Mobile Networks., , , and . ICC, page 1-5. IEEE, (2009)Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud., , , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 127-144. Springer, (2017)Modeling TCG-Based Secure Systems with Colored Petri Nets., , , , and . INTRUST, volume 6802 of Lecture Notes in Computer Science, page 67-86. Springer, (2010)Privacy and Ownership Preserving of Outsourced Medical Data., , , and . ICDE, page 521-532. IEEE Computer Society, (2005)A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises., , and . SEC, volume 181 of IFIP, page 95-112. Springer, (2005)Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing., , and . INTRUST, volume 6802 of Lecture Notes in Computer Science, page 189-199. Springer, (2010)