Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Signature Schemes with Tight Security Reductions., , and . ISPEC, volume 11879 of Lecture Notes in Computer Science, page 273-292. Springer, (2019)A Review of Cryptographic Electronic Voting., , and . Symmetry, 14 (5): 858 (2022)ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism., , and . Symmetry, 13 (9): 1640 (2021)A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures., , and . Symmetry, 13 (8): 1330 (2021)Reset-Secure Identity-Based Identification Schemes Without Pairings., , and . ProvSec, volume 9451 of Lecture Notes in Computer Science, page 227-246. Springer, (2015)Evaluating Pairing-Free Identity-Based Identification Using Curve25519., , and . ACeS, volume 1347 of Communications in Computer and Information Science, page 179-193. Springer, (2020)Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API., , and . ICITST, page 1-4. IEEE, (2020)Easy Simple Factoring-based Digital Signature Scheme., , , and . ICITST, page 1-4. IEEE, (2020)An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model., , and . EuroPKI, volume 5057 of Lecture Notes in Computer Science, page 60-73. Springer, (2008)IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices., , , and . Wireless Personal Communications, 94 (1): 127-144 (2017)