Author of the publication

Design of Proxy Signature Schemes Using Self-Certified Public Keys from Pairings.

, , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 914-924. IOS Press, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography., , , , and . New Trends in Intelligent Information and Database Systems, volume 598 of Studies in Computational Intelligence, Springer, (2015)Design of Proxy Signature Schemes Using Self-Certified Public Keys from Pairings., , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 914-924. IOS Press, (2014)A secure IRB system for assisting the development of intelligent medical devices., , and . Expert Syst. Appl., 39 (16): 12512-12521 (2012)Designing an Intelligent Health Monitoring System and Exploring User Acceptance for the Elderly., , and . J. Medical Systems, 37 (6): 9967 (2013)A Telehealthcare System to Care for Older People Suffering from Metabolic Syndrome., , and . HCI (6), volume 6766 of Lecture Notes in Computer Science, page 234-242. Springer, (2011)A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks., and . Inf. Sci., 179 (4): 422-429 (2009)The Perceived Benefits of 6-Degree-Separation Social Networks., and . Internet Res., 21 (1): 26-45 (2011)A Novel Remote User Authentication Scheme from Bilinear Pairings Via Internet., , and . Wireless Personal Communications, 83 (1): 163-174 (2015)Continuing Use of SNS Games for the Growth of Social Network Services., , and . CONF-IRM, page 30. (2012)Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions., , , , and . Inf. Technol. Control., 43 (4): 381-389 (2014)