Author of the publication

Natural sd-RCCA Secure Public-Key Encryptions.

, , and . ProvSec, volume 10592 of Lecture Notes in Computer Science, page 236-250. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TrustR: An Integrated Router Security Framework for Protecting Computer Networks., , and . IEEE Communications Letters, 20 (2): 376-379 (2016)A Trust Management System for Securing Data Plane of Ad-Hoc Networks., , and . IEEE Trans. Vehicular Technology, 65 (9): 7579-7592 (2016)Cloud-based radio frequency identification authentication protocol with location privacy protection., , , and . IJDSN, (2018)An Efficient Trusted Mobile Router Selection Mechanism for Multihomed NEMO Network., , and . CyberC, page 14-18. IEEE Computer Society, (2014)Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm., and . Security and Communication Networks, 8 (18): 3323-3334 (2015)RCCA Security for KEM+DEM Style Hybrid Encryptions., and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 102-121. Springer, (2012)Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms., , , , and . J. UCS, 25 (3): 158-181 (2019)RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions., and . Security and Communication Networks, 7 (8): 1219-1231 (2014)Natural sd-RCCA Secure Public-Key Encryptions., , and . ProvSec, volume 10592 of Lecture Notes in Computer Science, page 236-250. Springer, (2017)Trust based routing mechanism for securing OSLR-based MANET., , and . Ad Hoc Networks, (2015)