Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Detection of Vehicles Based-on the Moving Region., , , and . CAD/Graphics, page 202-207. IEEE, (2007)t-Out-of-n String/Bit Oblivious Transfers Revisited., , , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 410-421. Springer, (2005)Efficient group key management for secure big data in predictable large-scale networks., , , , and . Concurr. Comput. Pract. Exp., 28 (4): 1174-1192 (2016)Privacy Protection Method Based on Access Control., , , , and . APSIPA, page 254-259. IEEE, (2018)Asymmetric group key agreement protocol for open networks and its application to broadcast encryption., , , , and . Comput. Networks, 55 (15): 3246-3255 (2011)Provably secure one-round identity-based authenticated asymmetric group key agreement protocol., , , and . Inf. Sci., 181 (19): 4318-4329 (2011)Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments., , , , , and . Wirel. Pers. Commun., 116 (3): 1765-1783 (2021)A Scalable Cross-Chain Access Control and Identity Authentication Scheme., , , , , and . Sensors, 23 (4): 2000 (February 2023)Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures., , , , , and . Peer-to-Peer Netw. Appl., 11 (2): 235-251 (2018)Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme)., , , , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 531-540. Springer, (2006)