Author of the publication

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.

, , , , and . Comput. J., 56 (4): 407-421 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Undeniable Billing in Mobile Communication., and . MobiCom, page 284-290. ACM, (1998)How to achieve non-repudiation of origin with privacy protection in cloud computing., , , and . J. Comput. Syst. Sci., 79 (8): 1200-1213 (2013)An effective multi-layered defense framework against spam., , , and . Inf. Sec. Techn. Report, 12 (3): 179-185 (2007)Non-repudiation protocols for multiple entities., , and . Computer Communications, 27 (16): 1608-1616 (2004)Further analysis of the Internet key exchange protocol.. Computer Communications, 23 (17): 1606-1612 (2000)An optimistic fair exchange protocol with active intermediaries., , , and . Int. J. Inf. Sec., 12 (4): 299-318 (2013)Preface., and . Journal of Computer Security, 14 (5): 389-390 (2006)Efficient Linkable and/or Threshold Ring Signature Without Random Oracles., , , , and . Comput. J., 56 (4): 407-421 (2013)Protecting the internet of things., , , and . Security and Communication Networks, 7 (12): 2637-2638 (2014)Non-Repudiation.. Handbook of Financial Cryptography and Security, Chapman and Hall/CRC, (2010)