Author of the publication

Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption.

, , , , and . FGIT-EL/DTA/UNESST, volume 352 of Communications in Computer and Information Science, page 99-102. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extensible Interface Using Projector-Based Augmentation., , , and . CGVR, page 132-137. CSREA Press, (2006)Intrinsic Camera Calibration Based on Radical Center Estimation., , and . CISST, page 7-13. CSREA Press, (2004)Vulnerabilities of Android OS-Based Telematics System., , , , and . Wireless Personal Communications, 92 (4): 1511-1530 (2017)Robust E-mail protocols with perfect forward secrecy., , and . IEEE Communications Letters, 10 (6): 510-512 (2006)Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials., , , and . IEEE Access, (2020)Predictability of Android OpenSSL's pseudo random number generator., , and . ACM Conference on Computer and Communications Security, page 659-668. ACM, (2013)Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique., , , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 85-97. Springer, (2018)Improved hidden vector encryption with short ciphertexts and tokens., and . Des. Codes Cryptogr., 58 (3): 297-319 (2011)A Practical Security Architecture for In-Vehicle CAN-FD., , , and . IEEE Trans. Intell. Transp. Syst., 17 (8): 2248-2261 (2016)Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies., , and . Public Key Cryptography, volume 7778 of Lecture Notes in Computer Science, page 423-442. Springer, (2013)