Author of the publication

Practical (fully) distributed signatures provably secure in the standard model.

, , , , , , and . Theor. Comput. Sci., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response., , , , and . CoRR, (2015)On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures)., , , , and . CoRR, (2015)Secure pay-TV for chained hotels., , , , and . Int. J. Inf. Sec., 17 (1): 33-42 (2018)Fast Detection of Vehicles Based-on the Moving Region., , , and . CAD/Graphics, page 202-207. IEEE, (2007)t-Out-of-n String/Bit Oblivious Transfers Revisited., , , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 410-421. Springer, (2005)Towards cost-effective and low latency data center network architecture., , , , and . Comput. Commun., (2016)Efficient group key management for secure big data in predictable large-scale networks., , , , and . Concurr. Comput. Pract. Exp., 28 (4): 1174-1192 (2016)Privacy Protection Method Based on Access Control., , , , and . APSIPA, page 254-259. IEEE, (2018)Handwritten Mathematical Expression Recognition via Attention Aggregation based Bi-directional Mutual Learning., , , , , and . CoRR, (2021)Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)