Author of the publication

An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems.

, , , and . INCoS, page 199-202. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Construction of Building Footprints From Airborne LIDAR Data., , and . IEEE Trans. Geosci. Remote. Sens., 44 (9): 2523-2533 (2006)Identity-based signcryption from lattices., , , , and . Secur. Commun. Networks, 8 (18): 3751-3770 (2015)A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem., , , , and . Secur. Commun. Networks, 8 (18): 3592-3601 (2015)Practical NTRU Signcryption in the Standard Model., , , , , and . Entropy, 25 (12): 1651 (December 2023)An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems., , , and . INCoS, page 199-202. IEEE, (2016)CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model., , , and . J. Softw., 8 (5): 1245-1253 (2013)A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure., , , , and . KSII Trans. Internet Inf. Syst., 8 (12): 4552-4567 (2014)Model guided DLP 3D printing for solid and hollow structure., , , , , and . HSI, page 1-6. IEEE, (2021)A Nonlinear Variational Model for PET Reconstruction., and . ICPR (4), page 699-702. IEEE Computer Society, (2006)A Graph Reduction Method for 2D Snake Problems., , , , and . CVPR, IEEE Computer Society, (2007)