Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage., , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3644-3655 (July 2024)Anonymous certificateless multi-receiver encryption scheme for smart community management systems.. Soft Comput., 24 (1): 281-292 (2020)Two new identity-based threshold ring signature schemes., and . Theor. Comput. Sci., (2014)A Zero-Knowledge Identification Scheme Based on Matrix Power Problem., , , and . 3PGCIC, page 868-871. IEEE Computer Society, (2015)A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment., , , , , and . Soft Comput., 25 (15): 10037-10051 (2021)Secure and Distributed IoV Data Sharing Scheme Based on a Hybrid PoS Blockchain Protocol., , , , and . IEEE Trans. Veh. Technol., 73 (8): 11995-12009 (August 2024)Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain., , , , , and . Veh. Commun., (2024)A Lightweight Certificateless Aggregation Signature Scheme With Provably Security in the Standard Model., , and . IEEE Syst. J., 14 (3): 4242-4251 (2020)Certificateless short signature scheme from pairing in the standard model., , , and . Int. J. Commun. Syst., (2018)Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage., , , , and . IEEE Trans. Serv. Comput., 16 (6): 3986-3998 (November 2023)