Author of the publication

Security model and modular design of fair authentication key exchange protocols.

, and . SCIENCE CHINA Information Sciences, 53 (2): 278-287 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated User Profiling in Location-Based Mobile Messaging Applications., , , , , and . TrustCom, page 18-26. IEEE Computer Society, (2014)Efficiently Attribute-Based Access Control for Mobile Cloud Storage System., , , and . TrustCom, page 292-299. IEEE Computer Society, (2014)An Effective Genetic Algorithm for Self-Inverse S-Boxes., and . CIS, page 618-622. IEEE Computer Society, (2007)Composing Administrative Scope of Delegation Policies based on extended XACML., and . EDOC, page 467-470. IEEE Computer Society, (2006)A secure and efficient revocation scheme for fine-grained access control in cloud storage., , , and . CloudCom, page 545-550. IEEE Computer Society, (2012)A New Direct Anonymous Attestation Scheme from Bilinear Maps., and . ICYCS, page 2308-2313. IEEE Computer Society, (2008)Fault-tolerate Multiparty Electronic Contract Signing Protocol., and . AMT, volume 138 of Frontiers in Artificial Intelligence and Applications, page 79-85. IOS Press, (2006)Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication., , and . IEEE Communications Letters, 9 (4): 372-374 (2005)The Design of an Artificial Immune System., and . ICN/ICONS/MCL, page 195. IEEE Computer Society, (2006)Direct Anonymous Attestation in practice: Implementation and efficient revocation., , , , , and . PST, page 67-74. IEEE, (2014)