Author of the publication

Efficient Semi-static Secure Broadcast Encryption Scheme.

, , , and . Pairing, volume 8365 of Lecture Notes in Computer Science, page 62-76. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some results on self-orthogonal and self-dual codes., , and . Ars Comb., (2003)New orthogonal designs and sequences with two and three variables in order 28., and . Ars Comb., (1999)Covert Distributed Computing Using Java Through Web Spoofing., and . ACISP, volume 1438 of Lecture Notes in Computer Science, page 48-57. Springer, (1998)The Analysis of Zheng-Seberry Scheme., , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 159-168. Springer, (2002)Authentication via Multi-Service Tickets in the Kuperee Server., and . ESORICS, volume 875 of Lecture Notes in Computer Science, page 143-160. Springer, (1994)Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)., , and . ASIACRYPT, volume 1514 of Lecture Notes in Computer Science, page 380-391. Springer, (1998)A New Very Fast Stream Cipher : Tpy., and . AISC, volume 81 of CRPIT, page 5. Australian Computer Society, (2008)Replicating the Kuperee authentication server for increased security and reliability., and . ACISP, volume 1172 of Lecture Notes in Computer Science, page 14-26. Springer, (1996)Critical Sets in Orthogonal Arrays., and . Electron. Notes Discret. Math., (2003)On crystal sets., and . Australas. J Comb., (2012)