Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving raw data collection without a trusted authority for IoT., , , , and . Comput. Networks, (2019)Provably Secure Proactive Secret Sharing Without the Adjacent Assumption., , , , , and . ProvSec, volume 11821 of Lecture Notes in Computer Science, page 247-264. Springer, (2019)Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry., , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 73-86. Springer, (2016)Detection and classification of malicious patterns in network traffic using Benford's law., , , , , and . APSIPA, page 864-872. IEEE, (2017)An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials., , , and . Symmetry, 11 (1): 88 (2019)An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET., , , , , and . IEEE Internet Things J., 10 (24): 22823-22835 (December 2023)An Efficient Certificateless Signature Scheme With Provably Security and Its Applications., , , , , , and . IEEE Syst. J., 17 (4): 5636-5647 (December 2023)A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage., , , and . Frontiers Inf. Technol. Electron. Eng., 20 (6): 787-800 (2019)Quorum controlled homomorphic re-encryption for privacy preserving computations in the cloud., , , and . Inf. Sci., (April 2023)Comments on 'Chinese Remainder Theorem-based centralised group key management for secure multicast communication'., , and . IET Inf. Secur., 17 (2): 309-314 (March 2023)