Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MLAS: multiple level authentication scheme for VANETs., , , and . AsiaCCS, page 471-475. ACM, (2011)PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid., , , , and . IEEE Trans. Dependable Secur. Comput., 12 (1): 85-97 (2015)Signcryption in Hierarchical Identity Based Cryptosystem., , , and . IACR Cryptology ePrint Archive, (2004)WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps., , , , , and . WISEC, page 25:1-25:12. ACM, (2015)Forward-secure multisignature and blind signature schemes., , , and . Appl. Math. Comput., 168 (2): 895-908 (2005)Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed., , , , , , , , , and 11 other author(s). IEEE J. Sel. Areas Commun., 24 (10): 1889-1900 (2006)A Secure Modified ID-Based Undeniable Signature Scheme., , , and . IACR Cryptol. ePrint Arch., (2003)UFLE: a user-friendly location-free encryption system for mobile users., , , and . Secur. Commun. Networks, 7 (10): 1477-1487 (2014)A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities., , , , and . Pervasive Mob. Comput., (2017)Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design., , , , , , , , , and . Quantum Inf. Process., 13 (6): 1425-1435 (2014)