Author of the publication

Trust-based group services selection in web-based service-oriented environments.

, , and . World Wide Web, 19 (5): 807-832 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Group Cryptography: Signature and Encryption., and . Informatica (Slovenia), (2002)Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks., and . Frontiers Comput. Sci., 8 (3): 456-468 (2014)Continuous Leakage Resilient Lossy Trapdoor Functions., , , and . Information, 8 (2): 38 (2017)Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting., , and . Wireless Personal Communications, 94 (3): 1017-1034 (2017)First price sealed bid auction without auctioneers., , and . IWCMC, page 127-131. ACM, (2007)A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange., , and . Int. J. Comput. Math., 94 (5): 946-961 (2017)Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature., , , and . Comput. J., 54 (10): 1645-1651 (2011)Deniable Ring Authentication Based on Projective Hash Functions., , , and . ProvSec, volume 10592 of Lecture Notes in Computer Science, page 127-143. Springer, (2017)Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs., , and . IEEE Trans. Inf. Forensics Secur., 9 (1): 5-13 (2014)Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System., , , and . IEEE Access, (2019)