Author of the publication

Analysis and Improvement of an ID-Based Anonymous Signcryption Model.

, , , and . ICIC (1), volume 5754 of Lecture Notes in Computer Science, page 433-442. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments., , , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 516-526. Springer, (2008)Accurate detection of selective forwarding attack in wireless sensor networks., and . IJDSN, (2019)A Near-Infrared Face Detection and Recognition System Using ASM and PCA+LDA., , , , , , , , and . JNW, 9 (10): 2728-2733 (2014)New forward-secure signature schemes with untrusted update., , , , and . Frontiers of Computer Science, 7 (4): 536-543 (2013)Threshold public key encryption scheme resilient against continual leakage without random oracles., , , and . Frontiers of Computer Science, 7 (6): 955-968 (2013)Ordered Semiring-based Trust Establish Model with Risk Evaluating., , , and . I. J. Network Security, 8 (2): 101-106 (2009)An Efficient Anonymous Fingerprinting Protocol., , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 824-832. Springer, (2006)Gaussian sampling of lattices for cryptographic applications., , , and . SCIENCE CHINA Information Sciences, 57 (7): 1-8 (2014)Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor., , , and . I. J. Network Security, 12 (1): 50-57 (2011)The global avalanche characteristics of two Boolean functions and algebraic immunity., , , and . Int. J. Comput. Math., 89 (16): 2165-2179 (2012)