Author of the publication

Efficient and Identity-based Signcryption with Provably-secure.

, , and . J. Digit. Content Technol. its Appl., 4 (7): 148-153 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)., , , , and . SESS@ICSE, page 50-56. ACM, (2011)LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System., , , and . ICUCT, volume 4412 of Lecture Notes in Computer Science, page 80-89. Springer, (2006)How to Generate Universally Verifiable Signatures in Ad-Hoc Networks., , and . MADNES, volume 4074 of Lecture Notes in Computer Science, page 118-131. Springer, (2005)A new approach for UC security concurrent deniable authentication., , , and . Sci. China Ser. F Inf. Sci., 51 (4): 352-367 (2008)Comparison of Signal-Analysis Techniques for Seismic Detection System for High-Speed Train Data: Effect of Bridge Structures., and . Sensors, 20 (23): 6805 (2020)A Security Enhancement of the E0 Cipher in Bluetooth System., , and . KES-AMSTA, volume 4953 of Lecture Notes in Computer Science, page 858-867. Springer, (2008)A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks., , , , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 150-158. Springer, (2004)A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks., , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 517-526. Springer, (2004)A Random M-ary Method Based Countermeasure against Side Channel Attacks., , , and . ICCSA (2), volume 2668 of Lecture Notes in Computer Science, page 338-347. Springer, (2003)HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System., , , , , and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 557-567. Springer, (2007)