Author of the publication

An ID-Based Certified E-mail Protocol Suitable for Wireless Mobile Environments.

, , , and . PAAP, page 146-150. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A blockchain-based keyword search scheme with dual authorization for electronic health record sharing., , , , and . J. Inf. Secur. Appl., (2022)Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability., , , , and . IEEE Access, (2020)Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain., , , , and . IEEE Access, (2020)Leveled Adaptively Strong-Unforgeable Identity-Based Fully Homomorphic Signatures., , and . IEEE Access, (2020)Strong Designated Verifier Signature Scheme Resisting Replay Attack., , , and . Inf. Technol. Control., 44 (2): 165-171 (2015)Comments on Ättribute-Based Data Sharing Scheme Revisited in Cloud Computing"., , , and . IEEE Trans. Inf. Forensics Secur., (2021)An ID-Based Certified E-mail Protocol Suitable for Wireless Mobile Environments., , , and . PAAP, page 146-150. IEEE Computer Society, (2011)Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems., , , and . Secur. Commun. Networks, 9 (17): 4574-4584 (2016)Efficient and anonymous multi-message and multi-receiver electronic health records sharing scheme without secure channel based on blockchain., , , , , and . Trans. Emerg. Telecommun. Technol., (2021)Broadcast signcryption scheme based on certificateless in wireless sensor network., , , , and . Comput. Networks, (2022)