Author of the publication

A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments.

, , and . AsiaJCIS, page 91-96. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Multireceiver Identity-Based Encryption., , and . IEEE Trans. Computers, 59 (9): 1239-1249 (2010)Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol., , and . IACR Cryptology ePrint Archive, (2005)Attribute-Based Encryption from Identity-Based Encryption., , and . IACR Cryptology ePrint Archive, (2017)Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments., , , , and . MobiQuitous (Adjunct Proceedings), page 88-93. ACM, (2016)Buyer-seller watermarking protocols with off-line trusted third parties., , and . Int. J. Ad Hoc Ubiquitous Comput., 4 (1): 36-43 (2009)WeisoEvent: A Ming-Weiso Event Analytics Tool with Named Entity Markup and Spatial-Temporal Information Linking., , , , , and . DH, Alliance of Digital Humanities Organizations (ADHO), (2017)Risk of Bitcoin Addresses to be Identified from Features of Output Addresses., , and . DSC, page 1-6. IEEE, (2018)Active One-Time Password Mechanism for User Authentication., , , and . GPC, volume 7861 of Lecture Notes in Computer Science, page 464-471. Springer, (2013)Provably Secure Timed-Release Proxy Conditional Reencryption., , , , and . IEEE Syst. J., 11 (4): 2291-2302 (2017)Automatic Labeled Data Generation for Person Named Entity Disambiguation on the Ming Shilu., , , and . DH, (2020)