Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model., , , and . Int. J. Distributed Sens. Networks, 12 (1): 3205206:1-3205206:12 (2016)A Novel Hash-based RFID Mutual Authentication Protocol., , , and . CIS, page 774-778. IEEE Computer Society, (2011)A Novel Biometric-Based Authentication Scheme with Privacy Protection., and . IAS, page 295-298. IEEE Computer Society, (2009)Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme with Sender Traceability., , and . J. Inf. Secur. Appl., (2022)nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness., and . Comput. Informatics, 32 (3): 441-460 (2013)Efficient and secure certificateless signature scheme in the standard model., , , , and . Int. J. Commun. Syst., (2017)Anonymous multi-receiver ID-based signcryption scheme., , , and . IET Inf. Secur., 9 (3): 194-201 (2015)Improved multicast key management of Chinese wireless local area network security standard., , and . IET Commun., 6 (9): 1126-1130 (2012)Secure Communication Model of WSN Based on Secret Sharing., , , , and . CIS, page 483-487. IEEE Computer Society, (2010)An exploratory case study on IS implementation and organizational change in China., , and . ECIS, page 1062-1072. (2003)