Author of the publication

Generic Transformation from Weakly to Strongly Unforgeable Signatures.

, , , and . J. Comput. Sci. Technol., 23 (2): 240-252 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic Transformation from Weakly to Strongly Unforgeable Signatures., , , and . J. Comput. Sci. Technol., 23 (2): 240-252 (2008)Corrections to ÜWB Through-Wall Imaging Based on Compressive Sensing" Mar 10 1408-1415., , , and . IEEE Trans. Geoscience and Remote Sensing, 48 (3-2): 1634 (2010)A Summary of the Special Issue "Cybersecurity and Cryptography"., and . Information, 6 (4): 833-835 (2015)Time Capsule Signature: Efficient and Provably Secure Constructions., , , , and . EuroPKI, volume 4582 of Lecture Notes in Computer Science, page 126-142. Springer, (2007)A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract)., , and . Pairing, volume 6487 of Lecture Notes in Computer Science, page 41-61. Springer, (2010)Oblivious Transfer with Access Control : Realizing Disjunction without Duplication., , , , , , and . Pairing, volume 6487 of Lecture Notes in Computer Science, page 96-115. Springer, (2010)Extending Magic Sets Technique to Deductive Databases with Uncertainty., and . MUD, volume WP10-04 of CTIT Workshop Proceedings Series, page 19-33. Centre for Telematics and Information Technology (CTIT), University of Twente, The Netherlands, (2010)Short and efficient convertible undeniable signature schemes without random oracles., and . Theor. Comput. Sci., (2013)How to protect privacy in Optimistic Fair Exchange of digital signatures., , and . Inf. Sci., (2015)User-Defined Privacy Grid System for Continuous Location-Based Services., , , and . IEEE Trans. Mob. Comput., 14 (10): 2158-2172 (2015)