Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Platform Interactions and Emergence of an Organizational Field: Case Study on Ola., and . Australas. J. Inf. Syst., (2019)Password Protected Universal Thresholdizer., , , and . IACR Cryptol. ePrint Arch., (2024)Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model., , , and . Theor. Comput. Sci., (2021)One-sided leakage-resilient privacy only two-message oblivious transfer., and . J. Inf. Secur. Appl., 19 (4-5): 295-300 (2014)Satellite Based Fraction of Absorbed Photosynthetically Active Radiation Is Congruent with Plant Diversity in India., , , , , and . Remote. Sens., 13 (2): 159 (2021)Password Protected Secret Sharing from Lattices., , , and . ACNS (1), volume 12726 of Lecture Notes in Computer Science, page 442-459. Springer, (2021)Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction., , , , and . WISA, volume 12583 of Lecture Notes in Computer Science, page 245-257. Springer, (2020)Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness., , , , , , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 578-594. Springer, (2018)Secret Sharing on Evolving Multi-level Access Structure., , , , and . WISA, volume 11897 of Lecture Notes in Computer Science, page 180-191. Springer, (2019)A Lattice-Based Public Key Encryption with Equality Test in Standard Model., , , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 138-155. Springer, (2019)