Author of the publication

Identity-Based Cryptography for Securing Mobile Phone Calls.

, , , and . AINA Workshops, page 365-370. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Mobile Phone Calls with Identity-Based Cryptography., , , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 210-222. Springer, (2009)TrueIP: prevention of IP spoofing attacks using identity-based cryptography., , and . SIN, page 128-137. ACM, (2009)Identity-Based Cryptography for Securing Mobile Phone Calls., , , and . AINA Workshops, page 365-370. IEEE Computer Society, (2009)Secure mobile communication via identity-based cryptography and server-aided computations., , , and . The Journal of Supercomputing, 55 (2): 284-306 (2011)Secure session framework: an identity-based cryptographic key agreement and signature protocol.. University of Marburg, (2010)On the Validity of the phi-Hiding Assumption in Cryptographic Protocols., and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 344-354. Springer, (2008)An Identity-Based Key Agreement Protocol for the Network Layer., , and . SCN, volume 5229 of Lecture Notes in Computer Science, page 409-422. Springer, (2008)An identity-based security infrastructure for Cloud environments., , , , and . WCNIS, page 644-649. IEEE, (2010)The permanent, graph gadgets and counting solutions for certain types of planar formulas. CoRR, (2012)Secure on-demand grid computing., , , , , and . Future Generation Comp. Syst., 25 (3): 315-325 (2009)