Author of the publication

Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model.

, , and . Informatica, 23 (3): 443-460 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Broadbeam for Massive MIMO Systems., , and . CoRR, (2015)Buffer-aided secure two-hop communications with adaptive link selection and on/off power control., , and . WCSP, page 1-6. IEEE, (2017)Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall., , , and . IEEE Access, (2019)Toward optimizing cauchy matrix for cauchy reed-solomon code., , , , and . IEEE Communications Letters, 13 (8): 603-605 (2009)Privacy-Preserving Locally Weighted Linear Regression Over Encrypted Millions of Data., , , and . IEEE Access, (2020)Robust password changing and DoS resilience for human-centric password authentication., , , , and . Secur. Commun. Networks, 7 (10): 1552-1559 (2014)New application of partitioning methodology: identity-based dual receiver encryption., , , , and . Secur. Commun. Networks, 9 (18): 5789-5802 (2016)Privacy-Preserving Federated Learning via Functional Encryption, Revisited., , , and . IEEE Trans. Inf. Forensics Secur., (2023)Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study., , , and . Peer-to-Peer Netw. Appl., 10 (2): 357-367 (2017)Characterization of the East - West Spatial Uniformity for GOES-16/17 ABI Bands Using the Moon., , , and . Remote. Sens., 15 (7): 1881 (April 2023)