Author of the publication

Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks.

, and . ICISS, volume 7671 of Lecture Notes in Computer Science, page 294-309. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps., , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 336-354. Springer, (2015)Provably Secure Authenticated Tree Based Group Key Agreement., , and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 92-104. Springer, (2004)Towards fair mutual private set intersection with linear complexity., and . Secur. Commun. Networks, 9 (11): 1589-1612 (2016)Lattice-based nominative signature using pseudorandom function., , and . IET Inf. Secur., 15 (4): 317-332 (2021)Collusion resistant self-healing key distribution in mobile wireless networks, and . CoRR, (2012)Dynamic Group Key Agreement in Tree-Based Setting., and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 101-112. Springer, (2005)Forward Secure Offline Assisted Group Key Exchange From Isogeny-Based Blinded Key Encapsulation Mechanism., and . IEEE Trans. Inf. Theory, 69 (7): 4708-4722 (July 2023)Efficient Adaptively Secure Public-Key Trace and Revoke from Subset Cover Using Déjà Q Framework., and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 468-489. Springer, (2018)Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control., and . Inscrypt, volume 8957 of Lecture Notes in Computer Science, page 109-129. Springer, (2014)Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption., and . Communications and Multimedia Security, volume 8099 of Lecture Notes in Computer Science, page 66-81. Springer, (2013)