Author of the publication

Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system.

, , , and . Security and Communication Networks, 9 (16): 3309-3313 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a CIL Connector to Spin., and . International Journal of Software Engineering and Knowledge Engineering, 18 (1): 65-91 (2008)New Semantic Model for Authentication Protocols in ASMs., and . J. Comput. Sci. Technol., 19 (4): 555-563 (2004)An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain., , , and . ICWS, volume 11512 of Lecture Notes in Computer Science, page 110-125. Springer, (2019)Attribute-based multi-function verifiable computation., , , and . Future Generation Comp. Syst., (2018)Fast and Sensitive Ellipsometry-Based Biosensing., , , , , , and . Sensors, 18 (1): 15 (2018)CPM Signals for Satellite Navigation in the S and C Bands., , and . Sensors, 15 (6): 13184-13200 (2015)A randomized RSA-based partially blind signature scheme for electronic cash., , and . Computers & Security, 24 (1): 44-49 (2005)On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives., , , , and . IACR Cryptology ePrint Archive, (2012)Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system., , , and . Security and Communication Networks, 9 (16): 3309-3313 (2016)Matrix FHE and Its Application in Optimizing Bootstrapping., , , and . Comput. J., 61 (12): 1845-1861 (2018)