Author of the publication

On the Security Properties of Combinatorial All-or-nothing Transforms.

, , , , and . ISIT, page 1447-1452. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DSSH: Digital signature based secure handover for network-based mobility management., , and . Comput. Syst. Sci. Eng., (2012)Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters., , , , , and . IACR Cryptology ePrint Archive, (2015)An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency., , , , and . IACR Cryptology ePrint Archive, (2014)A new security middleware architecture based on fog computing and cloud to support IoT constrained devices., , and . IML, page 35:1-35:8. ACM, (2017)Cyberbullying detection using parent-child relationship between comments., , , and . iiWAS, page 325-334. ACM, (2016)Evasion Attacks Against Statistical Code Obfuscation Detectors., , and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 121-137. Springer, (2017)Protection of Data and Delegated Keys in Digital Distribution., , and . ACISP, volume 1270 of Lecture Notes in Computer Science, page 271-282. Springer, (1997)Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree., , , and . SECRYPT, page 37-49. SciTePress, (2011)Modeling and Containment of Search Worms Targeting Web Applications., and . DIMVA, volume 6201 of Lecture Notes in Computer Science, page 183-199. Springer, (2010)On the Complexity of Constant Round ZKIP of Possession of Knowledge., and . ASIACRYPT, volume 739 of Lecture Notes in Computer Science, page 331-345. Springer, (1991)