Author of the publication

Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack.

, and . Appl. Math. Comput., 168 (1): 305-319 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Photograph watermarking., , and . Multimedia Tools Appl., 75 (23): 16173-16189 (2016)Improvement of the Miyazaki-Takaragi threshold digital signature scheme., , , and . Inf. Process. Lett., 88 (4): 183-186 (2003)Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network., , and . IEEE Syst. J., 12 (3): 2385-2394 (2018)A publicly verifiable PCAE scheme for confidential applications with proxy delegation., , and . Trans. Emerg. Telecommun. Technol., 23 (2): 172-185 (2012)Toward Secure CB-Signcryption for Wireless Ad Hoc Networks., and . Ad Hoc Sens. Wirel. Networks, 36 (1-4): 1-20 (2017)Efficient proxy signature schemes using self-certified public keys., and . Appl. Math. Comput., 152 (3): 807-820 (2004)Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack., and . Appl. Math. Comput., 168 (1): 305-319 (2005)Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System., , and . KSII Trans. Internet Inf. Syst., 8 (3): 1157-1177 (2014)A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation., , and . J. Inf. Sci. Eng., 27 (2): 451-463 (2011)Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue., , , and . J. Digit. Inf. Manag., 9 (2): 51-54 (2011)