Author of the publication

A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.

, , , , , and . NSS, volume 11058 of Lecture Notes in Computer Science, page 111-124. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Permutable Cut-and-Choose Oblivious Transfer and Its Application., , , and . IEEE Access, (2020)Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps., , , , , and . Soft Comput., 22 (7): 2267-2274 (2018)Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing., , , , , and . Soft Comput., 21 (24): 7325-7335 (2017)An Adaptive Sweep-Circle Spatial Clustering Algorithm Based on Gestalt., , and . ISPRS Int. J. Geo Inf., 6 (9): 272 (2017)Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks., , , , , and . Mob. Inf. Syst., (2015)Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption., , , , , and . J. Ambient Intell. Humaniz. Comput., 15 (2): 1327-1337 (February 2024)New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems., , , and . J. High Speed Networks, 22 (2): 153-167 (2016)Privacy preserved wireless sensor location protocols based on mobile edge computing., , , and . Comput. Secur., (2019)New directly revocable attribute-based encryption scheme and its application in cloud storage environment., , , and . Clust. Comput., 20 (3): 2385-2392 (2017)Growth Analysis and CUSSIM Model in Cucumber Seedling., , , , and . IITA, page 319-322. IEEE Computer Society, (2007)