Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding., , , and . Future Gener. Comput. Syst., (2019)Multi-Use Unidirectional Proxy Re-Signatures of Constant Size without Random Oracles., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (3): 898-905 (2015)General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications., and . J. Softw., 9 (10): 2557-2563 (2014)Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions., and . Secur. Commun. Networks, 8 (8): 1525-1536 (2015)Identity-based proof of retrievability meets with identity-based network coding., and . Clust. Comput., 25 (5): 3067-3083 (2022)On the key dependent message security of DHIES., , , , and . ICAIT, page 322-328. IEEE, (2017)A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding., and . J. Commun., 10 (1): 43-47 (2015)Certificateless Dynamic Data Sharing Scheme With File Recommendation and Integrity Auditing Functions in Cloud-Fog Environment., and . IEEE Internet Things J., 11 (6): 9630-9644 (March 2024)KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited., and . SECRYPT, page 299-306. SciTePress, (2014)Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case., and . IEEE Access, (2020)