Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding., , , and . Future Gener. Comput. Syst., (2019)Efficient TPA-based auditing scheme for secure cloud storage., and . Clust. Comput., 24 (3): 1989-2000 (2021)SEE_ME: Software Engineering Education Methodology Exploration., , , and . TALE, page 49-53. IEEE, (2015)Identity-based remote data checking with a designated verifier., , , , and . J. Cloud Comput., (2022)Comment on Ä Tag Encoding Scheme Against Pollution Attack to Linear Network Coding"., , , and . IEEE Trans. Parallel Distributed Syst., 31 (11): 2618-2619 (2020)RKA Security for Identity-Based Signature Scheme., , , , and . IEEE Access, (2020)Secure network coding from secure proof of retrievability., , , , and . Sci. China Inf. Sci., (2021)On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (12): 2477-2480 (2018)Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited., , , and . IEEE Commun. Lett., 24 (12): 2723-2727 (2020)Efficient Key-Escrow-Free and Vehicle-Revocable Data Sharing Protocol for Vehicular Ad Hoc Network., , , and . IEEE Internet Things J., 11 (7): 11540-11553 (April 2024)