From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings., и . Comput. J., 58 (10): 2636-2648 (2015)Practical Signcryption for Secure Communication of Wireless Sensor Networks., , и . Wireless Personal Communications, 89 (4): 1391-1412 (2016)An efficient certificateless aggregate signature with constant pairing computations., , , и . Inf. Sci., (2013)Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test., , , , , и . IEEE Access, (2018)ID-Based Threshold Unsigncryption Scheme from Pairings., , и . CISC, том 3822 из Lecture Notes in Computer Science, стр. 242-253. Springer, (2005)An efficient certificateless deniable authentication protocol without pairings., , , и . Int. J. Electron. Secur. Digit. Forensics, 7 (2): 179-196 (2015)On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing., , , и . Int. J. Netw. Secur., 17 (2): 129-134 (2015)Provably secure and efficient certificateless authenticated tripartite key agreement protocol., , и . Math. Comput. Model., 55 (3-4): 1213-1221 (2012)Certificateless deniably authenticated encryption and its application to e-voting system., , и . Telecommun. Syst., 70 (3): 417-434 (2019)Security analysis and improvements on a semi-quantum electronic voting protocol., , , , и . IACR Cryptol. ePrint Arch., (2024)