Author of the publication

Removing Key Escrow from the LW-HIBE Scheme.

, , , , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 593-605. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Random Cladding with Feedback Mechanism for encrypting mobile messages., , , , , and . INFOCOM Workshops, page 970-975. IEEE, (2016)Prosperity of IT security technologies in homeland defense., , and . J. Ambient Intell. Humaniz. Comput., 5 (2): 169-171 (2014)Efficient Computation Offloading in Edge Computing Enabled Smart Home., , , and . IEEE Access, (2021)Next generation mobility management., , , and . Wirel. Commun. Mob. Comput., 11 (4): 443-445 (2011)Extension of MIH for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover., , , , and . Future Gener. Comput. Syst., (2019)Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing., , , and . IEEE Access, (2017)MIST 2016: 8th International Workshop on Managing Insider Security Threats., and . ACM Conference on Computer and Communications Security, page 1890-1891. ACM, (2016)Balanced bipartite graph based register allocation for network processors in mobile and wireless networks., , , , and . Mob. Inf. Syst., 6 (1): 65-83 (2010)Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process., , and . Mob. Inf. Syst., (2020)Improvised Model for Blockchain in Distributed Cloud Environment., , , , , and . CSS, volume 13547 of Lecture Notes in Computer Science, page 327-341. Springer, (2022)