Author of the publication

New forward-secure signature schemes with untrusted update.

, , , , and . Frontiers Comput. Sci., 7 (4): 536-543 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forecasting manufacturing industrial natural gas consumption of China using a novel time-delayed fractional grey model with multiple fractional order., , , , and . Comput. Appl. Math., (2020)From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions., and . ISC, volume 14411 of Lecture Notes in Computer Science, page 183-202. Springer, (2023)Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data., , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 288-302. Springer, (2018)User Access Privacy in OAuth 2.0 and OpenID Connect., and . EuroS&P Workshops, page 664-672. IEEE, (2020)Evolutionary Algorithms in Web Security: Exploring Untapped Potential., , and . CSNDSP, page 1-6. IEEE, (2020)Analysing the Security of Google's implementation of OpenID Connect., and . CoRR, (2015)LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator., , , , and . J. Ambient Intell. Humaniz. Comput., 14 (7): 8613-8629 (July 2023)An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter., , , and . Int. J. Netw. Secur., 18 (5): 960-968 (2016)ICAS: Two-factor identity-concealed authentication scheme for remote-servers., , , , , and . J. Syst. Archit., (2021)Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect., , and . CoRR, (2018)