Author of the publication

Security extension for the Canetti-Krawczyk model in identity-based systems.

, , and . Science in China Series F: Information Sciences, 48 (1): 117-124 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing., , and . I. J. Network Security, 11 (1): 17-22 (2010)Security extension for the Canetti-Krawczyk model in identity-based systems., , and . Science in China Series F: Information Sciences, 48 (1): 117-124 (2005)Keying Material Based Key Pre-distribution Scheme for Sensor Networks., , , and . Ad Hoc & Sensor Wireless Networks, 6 (1-2): 67-89 (2008)Keying material based key pre-distribution scheme., , , and . ISI, page 218-221. IEEE, (2008)Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure., , and . J. Cryptographic Engineering, 2 (2): 99-110 (2012)Asymmetric Key Pre-distribution Scheme for sensor networks., , , and . IEEE Trans. Wireless Communications, 8 (3): 1366-1372 (2009)Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation., , , and . ISPAN, page 243-248. IEEE Computer Society, (2009)Cryptanalysis on the Robust and Simple Authentication Protocol for Secure Communication on the Web., , and . IEICE Transactions, 89-A (6): 1859-1862 (2006)Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks., , and . IEICE Transactions, 93-D (3): 484-490 (2010)Efficient Distributed Signcryption Scheme as Group Signcryption., and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 403-417. Springer, (2003)