Author of the publication

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.

, , , , and . Comput. J., 56 (4): 407-421 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Concerns in Popular Cloud Storage Services., , , , , and . IEEE Pervasive Computing, 12 (4): 50-57 (2013)Cooperative attribute-based access control for enterprise computing system., , , , and . IJES, 7 (3/4): 191-202 (2015)Toward efficient and privacy-preserving computing in big data era., , , , and . IEEE Network, 28 (4): 46-50 (2014)Universal designated verifier transitive signatures for graph-based big data., , , , and . Inf. Sci., (2015)Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature., and . Int. J. Found. Comput. Sci., 17 (6): 1403-1422 (2006)Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful., , and . CoRR, (2019)Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption., , , , , , , and . J. UCS, 25 (3): 222-244 (2019)Two-Factor Data Security Protection Mechanism for Cloud Storage System., , , , and . IEEE Trans. Computers, 65 (6): 1992-2004 (2016)Towards secure and cost-effective fuzzy access control in mobile cloud computing., , , , and . Soft Comput., 21 (10): 2643-2649 (2017)Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol., , , , , and . Comput. J., 59 (7): 945-954 (2016)