Author of the publication

All-but-One Dual Projective Hashing and Its Applications.

, , , , , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 181-198. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation., , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 679-696. Springer, (2012)Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications., , and . CT-RSA, volume 8366 of Lecture Notes in Computer Science, page 85-105. Springer, (2014)Identity Based Delegation Network., , , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 99-115. Springer, (2005)Role Activation Management in Role Based Access Control., , , and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 358-369. Springer, (2005)Identity Based Threshold Ring Signature., , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 218-232. Springer, (2004)Running on Karma - P2P Reputation and Currency Systems.. CANS, volume 4856 of Lecture Notes in Computer Science, page 146-158. Springer, (2007)Efficient Identity Based Ring Signature., , and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 499-512. (2005)Impact of Recent Advances in Crytography on Online Game., , and . ADCOG, page 68-73. City University of Hong Kong, (2004)Learning Model with Error - Exposing the Hidden Model of BAYHENN., , , , and . IJCAI, page 3529-3535. ijcai.org, (2020)Scheduled for July 2020, Yokohama, Japan, postponed due to the Corona pandemic..Are you The One to Share? Secret Transfer with Access Structure., and . Proc. Priv. Enhancing Technol., 2017 (1): 149-169 (2017)