Author of the publication

Identity-based key distribution for mobile Ad Hoc networks.

, , and . Frontiers of Computer Science in China, 5 (4): 442-447 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A knapsack-based probabilistic encryption scheme., , and . Inf. Sci., 177 (19): 3981-3994 (2007)Cryptanalysis of a Knapsack Public Key Cryptosystem., , and . IAS, page 49-52. IEEE Computer Society, (2009)Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks., , and . Security and Communication Networks, 6 (1): 49-57 (2013)Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption., , , , , and . IEEE Access, (2019)Traceable-then-revocable ciphertext-policy attribute-based encryption scheme., , , and . Future Generation Comp. Syst., (2019)Building Secure Public Key Encryption Scheme from Hidden Field Equations., , , and . Security and Communication Networks, (2017)Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network., and . Security and Communication Networks, (2019)Secure Privacy-Preserving Association Rule Mining With Single Cloud Server., , , , , , and . IEEE Access, (2021)Lattice-based deniable ring signatures., , , , , and . Int. J. Inf. Sec., 18 (3): 355-370 (2019)Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation., , , , and . J. Ambient Intelligence and Humanized Computing, 10 (2): 429-438 (2019)