Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost., , , , and . Theor. Comput. Sci., (2018)Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis., , , and . Inf. Sci., (March 2024)Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments., , and . IEEE Trans. Inf. Forensics Secur., (2022)Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction., , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 299-319. Springer, (2023)Public Key Encryption with Delegated Equality Test in a Multi-User Setting., , , and . Comput. J., 58 (4): 986-1002 (2015)CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model., and . Comput. J., 64 (8): 1239-1252 (2021)Group ID-Based Encryption with Equality Test., , , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 39-57. Springer, (2019)Overcoming the information overload problem in a multiform feedback-based virtual reality system for hand motion rehabilitation: healthy subject case study., , , and . Virtual Reality, 16 (4): 325-334 (2012)A General Two-Server Cryptosystem Supporting Complex Queries., and . WISA, volume 10763 of Lecture Notes in Computer Science, page 249-260. Springer, (2017)Stand-Alone Unlicensed LTE (SAiL)., , , , , and . GLOBECOM, page 1-5. IEEE, (2016)