Author of the publication

A novel pairing-free certificateless authenticated key agreement protocol with provable security.

, , , and . Frontiers Comput. Sci., 7 (4): 544-557 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificateless proxy multi-signature., and . Inf. Sci., (2014)Study on the Technology of the Secure Computation in the Different Adversarial Models., , , and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 473-478. Springer, (2011)Cryptanalysis and improvement of a certificateless encryption scheme in the standard model., , , and . Frontiers Comput. Sci., 8 (1): 163-173 (2014)Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity., , , and . Sensors, 19 (14): 3144 (2019)Cryptanalysis of a multi-party quantum key agreement protocol with single particles., , , , and . Quantum Inf. Process., 13 (7): 1651-1657 (2014)Searchain: Blockchain-based private keyword search in decentralized storage., , , , and . Future Gener. Comput. Syst., (2020)Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks., , , , , and . Secur. Commun. Networks, (2021)An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems., , , , and . J. Medical Syst., 39 (3): 20 (2015)Improving the Adaptive Steganographic Methods Based on Modulus Function., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (12): 2731-2734 (2013)An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network., , , and . Comput. Commun., 35 (2): 188-195 (2012)