Author of the publication

An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext.

, , and . JDCTA, 4 (4): 7-14 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Multi-bit Shifting Algorithm in Multiplicative Inversion Problems., and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 102-110. Springer, (2005)Modified Token-Update Scheme for Site Authentication., , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 111-116. Springer, (2005)An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext., , and . JDCTA, 4 (4): 7-14 (2010)Policy Negotiation System Architecture for Privacy Protection., , and . NCM (2), page 592-597. IEEE Computer Society, (2008)978-0-7695-3322-3.Pseudorandom Number Generator Using Optimal Normal Basis., and . ICCSA (3), volume 3982 of Lecture Notes in Computer Science, page 206-212. Springer, (2006)An Efficient Electronic Marketplace Bidding Auction Protocol with Bid Privacy., , and . APWeb, volume 4976 of Lecture Notes in Computer Science, page 297-308. Springer, (2008)A Provable Secure Authentication Protocol Given Forward Secure Session Key., , and . APWeb, volume 4976 of Lecture Notes in Computer Science, page 309-318. Springer, (2008)