Author of the publication

Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds.

, , , , , and . IET Information Security, 10 (6): 358-371 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Topics in Software Industry Transformation Research: A Topic Analysis of Major IS Conferences., , , , and . ICSOB, volume 114 of Lecture Notes in Business Information Processing, page 128-140. Springer, (2012)Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks., , , and . CSF, page 109-123. IEEE Computer Society, (2009)Transparency - Activity Theory-Guided Support for Information Work., and . CASFE, volume 970 of CEUR Workshop Proceedings, CEUR-WS.org, (2012)Activity-centric support for weakly-structured business processes., , and . EICS, page 251-260. ACM, (2010)Designing for information work at the computer workplace with activity theory., and . NordiCHI, page 648-657. ACM, (2014)Let's Get Physical: Models and Methods for Real-World Security Protocols., , , and . TPHOLs, volume 5674 of Lecture Notes in Computer Science, page 1-22. Springer, (2009)What Belongs Together Comes Together: Activity-centric Document Clustering for Information Work., , , and . IUI, page 60-70. ACM, (2016)Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds., , , , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 355-376. Springer, (2015)Formal Reasoning about Physical Properties of Security Protocols., , , and . ACM Trans. Inf. Syst. Secur., 14 (2): 16:1-16:28 (2011)Upgrading Wireless Home Routers for Enabling Large-Scale Deployment of Cloudlets., , , , , and . MobiCASE, volume 162 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 12-29. Springer, (2015)