Author of the publication

Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09.

, , , and . CANS, volume 7092 of Lecture Notes in Computer Science, page 172-184. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Age From Gait: A Survey., , , , and . IEEE Access, (2021)Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128., , , and . J. Cryptogr. Eng., 13 (3): 265-281 (September 2023)A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms., , , and . IEEE Access, (2020)Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes., , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 100-105. Springer, (2008)OFF-ApexNet on Micro-expression Recognition System., , , , and . CoRR, (2018)Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage., , , , , , , , and . Hum. centric Comput. Inf. Sci., (2015)Proxy Re-encryption with Keyword Search: New Definitions and Algorithms., , , and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 149-160. Springer, (2010)OFF-ApexNet on micro-expression recognition system., , , , and . Signal Process. Image Commun., (2019)Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester., , , and . Int. J. Comput. Math., 90 (12): 2581-2587 (2013)Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review., , , and . IEEE Access, (2022)