Author of the publication

Scalable attribute-based group key establishment: from passive to active and deniable.

, and . Appl. Algebra Eng. Commun. Comput., 25 (1-2): 1-20 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable attribute-based group key establishment: from passive to active and deniable., and . Appl. Algebra Eng. Commun. Comput., 25 (1-2): 1-20 (2014)Scalable Deniable Group Key Establishment., , and . FPS, volume 7743 of Lecture Notes in Computer Science, page 365-373. Springer, (2012)Identity-based non-interactive key distribution with forward security., and . Des. Codes Cryptogr., 64 (1-2): 195-208 (2012)Group key exchange protocols withstanding ephemeral-key reveals., , and . IET Inf. Secur., 12 (1): 79-86 (2018)Group key exchange protocols withstanding ephemeral-key reveals., , and . IACR Cryptol. ePrint Arch., (2016)Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round., , and . CANS, 7712, page 158-168. Springer, (2012)Pitfalls in a server-aided authenticated group key establishment., , and . Inf. Sci., (2016)Attribute-based group key establishment., and . Adv. in Math. of Comm., 4 (3): 381-398 (2010)Cryptanalysis of a 2-party key establishment based on a semigroup action problem., and . Adv. in Math. of Comm., 5 (1): 87-92 (2011)Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption., , , and . SCN, volume 8642 of Lecture Notes in Computer Science, page 598-607. Springer, (2014)