Author of the publication

Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.

, , , , , , and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 348-359. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermarking method for extracting embedded data without original image., , , and . VCIP, volume 4671 of Proceedings of SPIE, page 915-922. SPIE, (2002)Secure Broadcast System with Simultaneous Individual Messaging., , , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (6): 1328-1337 (2011)Localization Attacks Using Matrix and Tensor Factorization., and . IEEE Trans. Inf. Forensics Secur., 11 (8): 1647-1660 (2016)A New Variant for an Attack Against RSA Signature Verification Using Parameter Field., , and . EuroPKI, volume 4582 of Lecture Notes in Computer Science, page 143-153. Springer, (2007)An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths., , , , , , and . AAECC, volume 4851 of Lecture Notes in Computer Science, page 80-89. Springer, (2007)HTTP Authentication Extensions for Interactive Clients., , , , , and . RFC, (January 2017)Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT., , , , , , and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 348-359. Springer, (2006)An improvement of discrete Tardos fingerprinting codes., , , , , , and . Des. Codes Cryptogr., 52 (3): 339-362 (2009)Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection., , and . IEEE Access, (2018)An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code., and . ICICS, volume 2513 of Lecture Notes in Computer Science, page 173-183. Springer, (2002)