Author of the publication

A Verifiable Proxy Re-encryption with Keyword Search without Random Oracle.

, , , and . CIS, page 474-478. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Further Discussions on the Security of a Nominative Signature Scheme., , and . IACR Cryptology ePrint Archive, (2006)A Verifiable Proxy Re-encryption with Keyword Search without Random Oracle., , , and . CIS, page 474-478. IEEE Computer Society, (2013)An ID-Based Short Group Signature Scheme., , , , and . JSW, 8 (3): 554-559 (2013)Design of Programming Experiment Course Platform Based on MOOCs., , , and . iJET, 14 (10): 208-216 (2019)Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security., and . Computers & Mathematics with Applications, 63 (1): 151-157 (2012)Spatio-Temporal Analysis of Vegetation Dynamics as a Response to Climate Variability and Drought Patterns in the Semiarid Region, Eritrea., , , , , , , , and . Remote Sensing, 11 (6): 724 (2019)An Overview of JB (Jade Bird) Component Library System JBCL., , , and . TOOLS (24), page 206-213. IEEE Computer Society, (1997)Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage., and . J. Medical Systems, 39 (2): 11 (2015)Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme., and . I. J. Network Security, 2 (1): 69-72 (2006)An Identity-based Mediated Signature Scheme from Bilinear Pairing., , and . I. J. Network Security, 2 (1): 29-33 (2006)