Author of the publication

RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.

, , , , , and . IET Information Security, 9 (2): 136-147 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making a good thing better: enhancing password/PIN-based user authentication with smartwatch., , , , and . Cybersecurity, 1 (1): 7 (2018)Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes., , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 307-325. Springer, (2010)Blockchain-Based Certificate Transparency and Revocation Transparency., , , , , and . Financial Cryptography Workshops, volume 10958 of Lecture Notes in Computer Science, page 144-162. Springer, (2018)Once Root Always a Threat: Analyzing the Security Threats of Android Permission System., , , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 354-369. Springer, (2014)Certificate Transparency in the Wild: Exploring the Reliability of Monitors., , , , , , and . CCS, page 2505-2520. ACM, (2019)Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization., , , and . CNS, page 1-9. IEEE, (2018)SEDB: Building Secure Database Services for Sensitive Data., , , and . ICICS, volume 8958 of Lecture Notes in Computer Science, page 16-30. Springer, (2014)A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem., , , , , , and . IACR Cryptology ePrint Archive, (2017)Blockchain-Based Certificate Transparency and Revocation Transparency., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (1): 681-697 (2022)Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations., , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 529-548. Springer, (2018)