Author of the publication

Secure PHR Access Control Scheme for Healthcare Application Clouds.

, , , , , , , and . ICPP, page 1067-1076. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient self-certified proxy CAE scheme and its variants., and . J. Syst. Softw., 82 (6): 974-980 (2009)Shoulder-surfing-proof graphical password authentication scheme., , , and . Int. J. Inf. Sec., 13 (3): 245-254 (2014)An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce., , and . J. Inf. Sci. Eng., 28 (4): 771-785 (2012)An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area Network., , and . J. Sensors, (2022)An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network., and . KSII Trans. Internet Inf. Syst., 7 (11): 2928-2940 (2013)New identity-based key-insulated convertible multi-authenticated encryption scheme., and . J. Netw. Comput. Appl., 34 (5): 1724-1731 (2011)A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise Attacks., , and . J. Softw., 12 (8): 649-659 (2017)On the security of a provably secure certificateless strong designated verifier signature scheme based on bilinear pairings., , and . ICTCE, page 61-65. ACM, (2017)On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems.. J. Medical Systems, 37 (2): 9929 (2013)On Delegatability of a Certificateless Strong Designated Verifier Signature Scheme., , and . ICS, volume 1013 of Communications in Computer and Information Science, page 550-558. Springer, (2018)