Author of the publication

Authenticated asymmetric group key agreement based on certificateless cryptosystem.

, , and . Int. J. Comput. Math., 91 (3): 447-460 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key management for Smart Grid based on asymmetric key-wrapping., , and . Int. J. Comput. Math., 92 (3): 498-512 (2015)Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs., , and . IEEE Trans. Dependable Secur. Comput., 12 (6): 615-625 (2015)Key distribution for heterogeneous public-key cryptosystems., , and . J. Commun. Networks, 15 (5): 464-468 (2013)Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes., , , and . Secur. Commun. Networks, (2020)AFL: Attention-Based Byzantine-Robust Federated Learning with Vector Filter., , and . GLOBECOM, page 595-600. IEEE, (2023)A Blockchain-Based Hierarchical Reputation Management Scheme in Vehicular Network., , , , , and . GLOBECOM, page 1-6. IEEE, (2019)Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks., , and . Secur. Commun. Networks, 6 (1): 49-57 (2013)Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks., and . IET Inf. Secur., (2013)Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs., , and . IEEE Trans. Inf. Forensics Secur., 9 (1): 5-13 (2014)Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage., , , , , and . IEEE Trans. Serv. Comput., 15 (3): 1664-1677 (2022)