Author of the publication

A Generic Construction for Proxy Cryptography.

. CSEE (1), volume 214 of Communications in Computer and Information Science, page 284-289. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT., and . IACR Cryptology ePrint Archive, (2016)A Certificateless Signature and Group Signature Schemes against Malicious PKG., and . AINA, page 334-341. IEEE Computer Society, (2008)An Attribute-Based Encryption Scheme Secure against Malicious KGC., , and . TrustCom, page 1376-1380. IEEE Computer Society, (2012)Embedded Built-In-Test Detection Circuit for Radio Frequency Systems and Circuits., and . DDECS, page 89-90. IEEE Computer Society, (2006)A Secure Threshold Signature Scheme from Lattices., , and . CIS, page 469-473. IEEE Computer Society, (2013)How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers., , , , and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 455-483. (2016)A distinguisher on PRESENT-like permutations with application to SPONGENT., and . Sci. China Inf. Sci., 60 (7): 72101 (2017)Optimal energy consumption for dynamic network coding in cooperative multicast system., , and . ICT, page 1-5. IEEE, (2013)Direct and indirect classification of high-frequency LNA performance using machine learning techniques., , , , and . ANNIIP, page 66-75. INSTICC Press, (2007)Secret Key Awareness Security Public Key Encryption Scheme., and . ISA, volume 200 of Communications in Computer and Information Science, page 53-61. Springer, (2011)