From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM., , , и . ACISP, том 13915 из Lecture Notes in Computer Science, стр. 199-219. Springer, (2023)An Efficient Privacy-Preserving E-coupon System., , и . Inscrypt, том 8957 из Lecture Notes in Computer Science, стр. 3-15. Springer, (2014)An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices., , и . WINE, том 3828 из Lecture Notes in Computer Science, стр. 500-509. Springer, (2005)Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications., , и . Wireless Personal Communications, 97 (2): 3017-3030 (2017)k-time Proxy Signature: Formal Definition and Efficient Construction., , , и . ProvSec, том 8209 из Lecture Notes in Computer Science, стр. 154-164. Springer, (2013)Group-Based Source-Destination Verifiable Encryption with Blacklist Checking., , и . ISPEC, том 10701 из Lecture Notes in Computer Science, стр. 186-203. Springer, (2017)Hierarchical Functional Encryption for Linear Transformations., , , и . ACISP (1), том 10342 из Lecture Notes in Computer Science, стр. 23-43. Springer, (2017)Dynamic Group Key Exchange Revisited., и . CANS, том 6467 из Lecture Notes in Computer Science, стр. 261-277. Springer, (2010)Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved., , , , , и . CRYPTO (4), том 12828 из Lecture Notes in Computer Science, стр. 270-300. Springer, (2021)A New General Framework for Secure Public Key Encryption with Keyword Search., , , , и . ACISP, том 9144 из Lecture Notes in Computer Science, стр. 59-76. Springer, (2015)