Author of the publication

An Anonymous Attribute-based Access Control System Supporting Access Structure Update.

, , , and . ISCISC, page 85-91. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework, , , and . CoRR, (2005)GSL-AKA: Group-based Secure Lightweight Authentication and Key Agreement Protocol for M2M Communication., , and . IST, page 275-280. IEEE, (2018)GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication., , and . ISC Int. J. Inf. Secur., 12 (2): 101-111 (2020)HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices., , , and . ISC Int. J. Inf. Secur., 16 (1): 93-114 (January 2024)Improved impossible differential and biclique cryptanalysis of HIGHT., , , , and . Int. J. Commun. Syst., (2018)A new universal test for bit strings., and . ACISP, volume 1172 of Lecture Notes in Computer Science, page 311-319. Springer, (1996)A practical distinguisher for the Shannon cipher., , , , and . J. Syst. Softw., 83 (4): 543-547 (2010)Guess and Determine Attack on Bivium., , , and . J. Inf. Process. Syst., 7 (1): 151-158 (2011)A Bit-Vector Differential Model for the Modular Addition by a Constant., , , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 385-414. Springer, (2020)Identity based universal re-encryption for mix nets., , and . ISCISC, page 1-5. IEEE, (2013)