Author of the publication

Advanced computer mathematics based cryptography and security technologies.

, , and . Int. J. Comput. Math., 90 (12): 2512-2514 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Group Cryptography: Signature and Encryption., and . Informatica (Slovenia), (2002)Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting., , and . Wireless Personal Communications, 94 (3): 1017-1034 (2017)Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature., , , and . Comput. J., 54 (10): 1645-1651 (2011)Efficient Micropayment of Cryptocurrency from Blockchains., and . Comput. J., 62 (4): 507-517 (2019)Signcryption Secure Against Linear Related-Key Attacks., , and . Comput. J., 57 (10): 1472-1483 (2014)Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks., and . Frontiers Comput. Sci., 8 (3): 456-468 (2014)Efficient E-coupon systems with strong user privacy., , , and . Telecommunication Systems, 64 (4): 695-708 (2017)Identity-based encryption resilient to continuous key leakage., , , , and . IET Information Security, 13 (5): 426-434 (2019)Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts., , , and . Int. J. Inf. Sec., 17 (4): 463-475 (2018)Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes., , , and . Int. J. Inf. Sec., 17 (5): 533-548 (2018)