Author of the publication

Secure multiple-times proxy signature scheme.

, and . Computer Standards & Interfaces, 31 (1): 19-23 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authenticating Tripartite Key Agreement Protocol with Pairings., , and . J. Comput. Sci. Technol., 19 (2): 169-176 (2004)Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited., , , and . Comput. J., 58 (10): 2747-2757 (2015)Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing., , and . Informatica, Lith. Acad. Sci., 17 (4): 519-534 (2006)Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme., , , and . Int. J. Communication Systems, 26 (5): 674-686 (2013)Cryptanalysis of a certificateless aggregate signature scheme., , , and . Security and Communication Networks, 9 (11): 1353-1358 (2016)Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards., , , , and . IEEE Trans. Industrial Electronics, 57 (2): 793-800 (2010)Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party., , and . J. Comput. Sci. Technol., 17 (6): 749-756 (2002)Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption., , , and . Cryptography, 2 (4): 33 (2018)Code-based Ring Signature Scheme., , and . I. J. Network Security, 5 (2): 154-157 (2007)MOHCS: Towards Mining Overlapping Highly Connected Subgraphs, , , and . CoRR, (2008)