Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A privacy enabling content distribution framework for digital rights management., and . Int. J. Trust. Manag. Comput. Commun., 2 (1): 22-39 (2014)Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation., , and . Public Key Cryptography (2), volume 10175 of Lecture Notes in Computer Science, page 463-493. Springer, (2017)An improved biometric-based remote user authentication scheme for connected healthcare., , and . Int. J. Ad Hoc Ubiquitous Comput., 18 (1/2): 75-84 (2015)A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems., , and . J. Medical Systems, 38 (10): 120 (2014)A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher., , and . IACR Cryptology ePrint Archive, (2014)Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method., , and . IACR Cryptology ePrint Archive, (2015)Forward Secure Efficient Group Signature in Dynamic Setting using Lattices., , and . IACR Cryptology ePrint Archive, (2017)Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs., , and . IACR Cryptology ePrint Archive, (2016)Generalized self-healing key distribution in wireless adhoc networks with trade-offs in user's pre-arranged life cycle and collusion resistance., , and . Q2SWinet, page 80-87. ACM, (2009)Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols., and . ICISS, volume 8303 of Lecture Notes in Computer Science, page 247-254. Springer, (2013)