Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Hierarchical Identity-Based Identification without Random Oracles., , and . ISC, volume 7483 of Lecture Notes in Computer Science, page 258-273. Springer, (2012)Security Enhancements by OR-Proof in Identity-Based Identification., , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 135-152. Springer, (2012)Private Information Retrieval Based on the Subgroup Membership Problem., and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 206-220. Springer, (2001)Generic Construction of Strongly Secure Timed-Release Public-Key Encryption., , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 319-336. Springer, (2011)On the q-Strong Diffie-Hellman Problem., and . IACR Cryptology ePrint Archive, (2010)Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification., , and . CANS, 7712, page 169-184. Springer, (2012)Generic Construction of Strongly Secure Timed-Release Public-Key Encryption., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 76-91 (2013)Construction of brain area risk map for decision making using surgical navigation and motor evoked potential monitoring information., , , , , , , , and . Int. J. Comput. Assist. Radiol. Surg., 18 (2): 269-278 (February 2023)Laser-marked alphanumeric character recognition by multi-angled parallel matching method., , , , and . ICPR (2), page 326-329. IEEE, (1992)Python Deserialization Denial of Services Attacks and Their Mitigations., and . CSII (selected papers), volume 787 of Studies in Computational Intelligence, page 15-25. Springer, (2018)