Author of the publication

RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.

, , , , , and . IET Information Security, 9 (2): 136-147 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia., , , , , and . IACR Cryptology ePrint Archive, (2015)Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation., , , , , , , , , and . CoRR, (2016)Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis., , , , , and . AsiaCCS, page 807-818. ACM, (2016)Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks., , , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 41-57. Springer, (2016)Dynamic Graph Link Prediction by Semantic Evolution., , , , , and . ICC, page 1-6. IEEE, (2019)A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers., , , , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 415-434. Springer, (2017)Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study., , , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 455-465. Springer, (2016)Aligning Users Across Social Networks by Joint User and Label Consistence Representation., , , , , and . ICONIP (2), volume 11954 of Lecture Notes in Computer Science, page 656-668. Springer, (2019)An Efficient Reconfigurable II-ONB Modular Multiplier., , , , , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 169-181. Springer, (2013)RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility., , , , , and . IET Information Security, 9 (2): 136-147 (2015)