Author of the publication

Secure Certificateless Proxy Re-encryption Without Pairing.

, , , , and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 85-101. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A review on social spam detection: Challenges, open issues, and future directions., , and . Expert Syst. Appl., (2021)Cryptanalysis and improvement of certificateless proxy signcryption scheme for e-prescription system in mobile cloud computing., and . Ann. des Télécommunications, 72 (9-10): 563-576 (2017)Improved search space shrinking for medical image retrieval using capsule architecture and decision fusion., , and . Expert Syst. Appl., (2021)A genetic algorithm based distance-aware routing protocol for wireless sensor networks., , , and . Comput. Electr. Eng., (2016)Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing., , and . Concurr. Comput. Pract. Exp., (2020)An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps., , , and . Int. J. Inf. Secur. Priv., 13 (4): 89-108 (2019)Blockchain adoption in agri-food supply chain management: an empirical study of the main drivers using extended UTAUT., , , and . Bus. Process. Manag. J., 29 (3): 737-756 (2023)On the Security of Authenticated Group Key Agreement Protocols., , , and . Scalable Comput. Pract. Exp., 20 (1): 93-99 (2019)Hybrid ensemble framework with self-attention mechanism for social spam detection on imbalanced data., , and . Expert Syst. Appl., (May 2023)Developing the framework of blockchain-enabled agri-food supply chain., , , and . Bus. Process. Manag. J., 30 (1): 291-316 (2024)