Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Almost-tight Identity Based Encryption against Selective Opening Attack., , , and . IACR Cryptol. ePrint Arch., (2015)A traceable threshold signature scheme with multiple signing policies., and . Comput. Secur., 25 (3): 201-206 (2006)Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing., , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (1): 94-105 (2018)CCA-Secure PRE Scheme without Random Oracles., , and . IACR Cryptol. ePrint Arch., (2010)GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks., , , and . Future Gener. Comput. Syst., (2019)Secure identity-based multisignature schemes under quadratic residue assumptions., , and . Secur. Commun. Networks, 6 (6): 689-701 (2013)Efficient ID-Based Multi-Receiver Threshold Decryption., , and . Int. J. Found. Comput. Sci., 18 (5): 987-1004 (2007)Secure and efficient encrypted keyword search for multi-user setting in cloud computing., , and . Peer-to-Peer Netw. Appl., 12 (1): 32-42 (2019)Existence of APAV(q, k) with q a prime power =5(mod 8) and k=1(mod 4)., , and . Discret. Math., 279 (1-3): 153-161 (2004)