Author of the publication

Security Mediated Certificateless Signatures.

, , , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 459-477. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Mediated Certificateless Signatures., , , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 459-477. Springer, (2007)An improved preimage attack against HAVAL-3., , and . Inf. Process. Lett., 115 (2): 386-393 (2015)Cryptanalysis of a CP-ABE scheme with policy in normal forms., and . Inf. Process. Lett., 116 (7): 492-495 (2016)Performance Analysis of an Fuzzy Logic Based LEACH Protocol., , and . ICSCA, page 33-37. ACM, (2019)Parallelizable MAC revisited., , , and . Secur. Commun. Networks, 7 (7): 1115-1127 (2014)Cancellable speech template via random binary orthogonal matrices projection hashing., , , , , , and . Pattern Recognit., (2018)Special issue on neural computing and applications 2021., , , , , and . Neural Comput. Appl., 34 (19): 16169-16171 (2022)Area-Time-Efficient Code-Based Postquantum Key Encapsulation Mechanism on FPGA., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 28 (12): 2672-2684 (2020)Cryptanalysis of genetic algorithm-based encryption scheme., , , , and . Multim. Tools Appl., 79 (35-36): 25259-25276 (2020)Study the Effect of Commonly Used Video Compression Techniques on Sound Recovery via Negligible Object Vibrations for Visual Surveillance System., , , , , , and . ICAIP, page 111-115. ACM, (2018)