Author of the publication

Cryptanalysis of Two Identity Based Signcryption Schemes.

, and . DASC, page 292-294. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic literature review on opportunities, challenges, and future research recommendations of artificial intelligence in education., , , , and . Comput. Educ. Artif. Intell., (2023)An Efficient and Robust Cloud-Based Deep Learning With Knowledge Distillation., , , and . IEEE Trans. Cloud Comput., 11 (2): 1733-1745 (April 2023)High-bandwidth ultrasonic communication using graphene-based acoustic devices., , and . INFOCOM Workshops, page 1-2. IEEE, (2018)Simultaneous optimization of the material properties and the topology of functionally graded structures., and . Comput. Aided Des., 40 (6): 660-675 (2008)A Multi-Class Automatic Sleep Staging Method Based on Long Short-Term Memory Network Using Single-Lead Electrocardiogram Signals., , , , , and . IEEE Access, (2019)Cost Management Based Secure Framework in Mobile Ad Hoc Networks., , , , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 63-72. Springer, (2005)A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques., , , , , , , and . Secur. Commun. Networks, (2020)The moderating effects of gender and need satisfaction on self-regulated learning through Artificial Intelligence (AI)., , and . Educ. Inf. Technol., 28 (7): 8691-8713 (2023)PRIDN: A Privacy Preserving Data Sharing on Named Data Networking., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)A Blockchain Peer-to-Peer Energy Trading System for Microgrids., , , , , and . IEEE Trans. Smart Grid, 14 (5): 3944-3960 (September 2023)