Author of the publication

A novel pairing-free certificateless authenticated key agreement protocol with provable security.

, , , and . Frontiers of Computer Science, 7 (4): 544-557 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption., , and . SCIENCE CHINA Information Sciences, 59 (3): 32109:1-32109:16 (2016)Rendering Realistic Ocean Scenes on GPU., , , and . Trans. Edutainment, (2012)Multi-samples Texture Synthesis for Dynamic Terrain Based on Constraint Conditions., , , and . Trans. Edutainment, (2012)A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption., , , and . Security and Communication Networks, 8 (17): 3167-3179 (2015)Computational electromagnetics in shielding analysis of system in package., , , and . EMC Compo, page 179-183. IEEE, (2015)A Moving Target Recognition Algorithm Based on Improved Mixture Gaussian Background Model., , , and . ICVIP, page 99-102. ACM, (2017)Nonlinear Calibration for N Thermocouple Sensor., , , and . ICSI (2), volume 7332 of Lecture Notes in Computer Science, page 368-375. Springer, (2012)A high-performance oscillator based on RF MEMS resonator and low-noise sustaining circuit for timing applications., , , , and . IEICE Electronic Express, 15 (10): 20180395 (2018)Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols, , , , and . CoRR, (2013)On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks.. IACR Cryptology ePrint Archive, (2013)