Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proxy Signatures for Delegating Signing Operation., , and . ACM Conference on Computer and Communications Security, page 48-57. ACM, (1996)Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks., , , , , and . Secur. Commun. Networks, 1 (2): 179-189 (2008)Protection of Data and Delegated Keys in Digital Distribution., , and . ACISP, volume 1270 of Lecture Notes in Computer Science, page 271-282. Springer, (1997)Privacy Risk Evaluation of Re-Identification of Pseudonyms., , , and . AsiaJCIS, page 165-172. IEEE, (2019)Quantum-resistant anonymous identity-based encryption with trable identities., , , , and . IET Inf. Secur., 16 (2): 111-126 (2022)On the Strength of the Strong RSA Assumption., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (5): 1164-1170 (2003)Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation., , , , and . IACR Cryptol. ePrint Arch., (2021)Problems on the MR micropayment schemes., , , and . AsiaCCS, page 363. ACM, (2006)Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs., , , , and . INTRUST, volume 9565 of Lecture Notes in Computer Science, page 32-48. Springer, (2015)Performance Comparison of Hybrid Encryption-based Access Control Schemes in NDN., , and . MSN, page 622-627. IEEE, (2021)