Author of the publication

Certified E-Mail Protocol in the ID-Based Setting.

, , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 340-353. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Truthful Spectrum Auctions for Multi-hop Secondary Networks., , and . IEEE Trans. Mob. Comput., 14 (2): 316-327 (2015)Security Arguments for a Class of ID-based Signatures., , and . IACR Cryptology ePrint Archive, (2007)基于协同地址碰撞的隐蔽认证方法 (Cooperative Address Knocking Based Covert Authentication)., , and . 计算机科学, 43 (9): 175-179 (2016)Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS., , and . IEEE Communications Letters, 14 (4): 366-368 (2010)An Improved Algorithm for uP + vQ Using JSF13., , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 467-478. Springer, (2004)Proof of Forward Security for Password-based Authenticated Key Exchange., and . Int. J. Netw. Secur., 7 (3): 335-341 (2008)MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)An Efficient Key-Evolving Signature Scheme Based on Pairing., and . FTDCS, page 68-73. IEEE Computer Society, (2004)High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes., , , , and . WISE (2), volume 8787 of Lecture Notes in Computer Science, page 336-350. Springer, (2014)ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise., , , , , , and . Comput. J., 67 (3): 976-987 (2024)