2025
Incentive-assisted multi-keyword ranked searchable encryption with hidden attributes for community data sharing.
Peer Peer Netw. Appl., June, 2025
A Survey of DDoS Attack and Defense Technologies in Multiaccess Edge Computing.
IEEE Internet Things J., January, 2025
Handwritten Signature Verification via Multimodal Consistency Learning.
IEEE Trans. Inf. Forensics Secur., 2025
A Synthetic Data-Assisted Satellite Terrestrial Integrated Network Intrusion Detection Framework.
IEEE Trans. Inf. Forensics Secur., 2025
Subversion resistant identity-based signature.
J. Syst. Archit., 2025
A server-aided secure interval test and comparison protocol with OPRF.
J. Syst. Archit., 2025
Efficient lightweight anonymous authentication scheme with certificateless aggregation for VANETs.
J. Inf. Secur. Appl., 2025
Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2025
Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing.
Future Gener. Comput. Syst., 2025
Multi-Scale Convolutional Neural Networks optimized by elite strategy dung beetle optimization algorithm for encrypted traffic classification.
Expert Syst. Appl., 2025
2024
Semi-quantum voting protocol with decentralization of vote verification and traceability.
Quantum Inf. Process., December, 2024
Triple Modal Signature (TMS) dataset.
Dataset, December, 2024
An anonymous broadcasting system with accountability based on group signatures.
Telecommun. Syst., October, 2024
Comment and improvement on the "semi-quantum ring signature protocol based on multi-particle GHZ state".
Quantum Inf. Process., August, 2024
A new construction of public key authenticated encryption with keyword search based on LWE.
Telecommun. Syst., June, 2024
A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability.
Telecommun. Syst., May, 2024
Blockchain-Based Privacy-Preserving Authentication With Hierarchical Access Control Using Polynomial Commitment for Mobile Cloud Computing.
IEEE Internet Things J., May, 2024
Versatile Remote Data Checking Scheme for Cloud-Assisted Internet of Things.
IEEE Internet Things J., April, 2024
A pairing-free certificateless authenticated searchable encryption with multi-trapdoor indistinguishability (MTP-IND) guarantees.
Telecommun. Syst., March, 2024
Secure quantum signature scheme without entangled state.
Quantum Inf. Process., February, 2024
Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement.
Quantum Inf. Process., February, 2024
Attribute-Based Hierarchical Keyword Auditing With Batch Fault Localization Assisted by Smart Contracts.
IEEE Trans. Cloud Comput., 2024
Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage.
J. Syst. Archit., 2024
A randomized encryption deduplication method against frequency attack.
J. Inf. Secur. Appl., 2024
PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption.
J. Inf. Secur. Appl., 2024
An efficient secure interval test protocol for small integers.
J. Inf. Secur. Appl., 2024
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application.
J. Inf. Secur. Appl., 2024
A majority affiliation based under-sampling method for class imbalance problem.
Inf. Sci., 2024
Security analysis and improvements on a semi-quantum electronic voting protocol.
IACR Cryptol. ePrint Arch., 2024
A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks.
Expert Syst. Appl., 2024
Computer vision based distributed denial of service attack detection for resource-limited devices.
Comput. Electr. Eng., 2024
Model-agnostic generation-enhanced technology for few-shot intrusion detection.
Appl. Intell., 2024
LA-IMDCN: A Lightweight Authentication Scheme With Smart Contract in Implantable Medical Device Communication Networks.
IEEE Access, 2024
Local Augmentation with Functionality-Preservation for Semi-Supervised Graph Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2024
2023
Guest editorial: Special issue on frontiers in cyber security.
J. Syst. Archit., December, 2023
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation.
Peer Peer Netw. Appl., November, 2023
A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing.
J. Syst. Archit., September, 2023
Solving Restricted Preemptive Scheduling on Parallel Machines with SAT and PMS.
J. Univers. Comput. Sci., August, 2023
Traffic data extraction and labeling for machine learning based attack detection in IoT networks.
Int. J. Mach. Learn. Cybern., July, 2023
Efficient and Secure Certificateless Signcryption Without Pairing for Edge Computing-Based Internet of Vehicles.
IEEE Trans. Veh. Technol., May, 2023
HAP-SG: Heterogeneous authentication protocol for smart grid.
Peer Peer Netw. Appl., May, 2023
Mitigation of a poisoning attack in federated learning by using historical distance detection.
Ann. des Télécommunications, April, 2023
A privacy preserving federated learning scheme using homomorphic encryption and secret sharing.
Telecommun. Syst., March, 2023
Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT.
IEEE Syst. J., March, 2023
An efficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles.
J. Syst. Archit., March, 2023
Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage.
IEEE Trans. Cloud Comput., 2023
ECAAP-SG: Efficient certificateless anonymous authentication protocol for SG.
Secur. Priv., 2023
A lightweight encrypted deduplication scheme supporting backup.
J. Syst. Archit., 2023
A group key agreement protocol based on ECDH and short signature.
J. Inf. Secur. Appl., 2023
Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.
Proceedings of the Provable and Practical Security, 2023
2022
A provably secure free-pairing certificateless searchable encryption scheme.
Telecommun. Syst., 2022
A computationally efficient HMAC-based authentication scheme for network coding.
Telecommun. Syst., 2022
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services.
IEEE Trans. Cloud Comput., 2022
Quantum public-key designated verifier signature.
Quantum Inf. Process., 2022
A two rounds dynamic authenticated group key agreement protocol based on LWE.
J. Syst. Archit., 2022
Offline/Online lattice-based ciphertext policy attribute-based encryption.
J. Syst. Archit., 2022
Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks.
Inf. Sci., 2022
A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles.
IEEE Internet Things J., 2022
A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things.
IEEE Internet Things J., 2022
A survey of lattice based expressive attribute based encryption.
Comput. Sci. Rev., 2022
A Secure User Authentication Protocol for Heterogeneous Mobile Environments.
IEEE Access, 2022
2021
A public key encryption scheme based on a new variant of LWE with small cipher size.
J. Syst. Archit., 2021
Comments on an identity-based signature scheme for VANETs.
J. Syst. Archit., 2021
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks.
J. Syst. Archit., 2021
Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability.
J. Syst. Archit., 2021
Digital signature with cryptographic reverse firewalls.
J. Syst. Archit., 2021
An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification.
J. Syst. Archit., 2021
Secure mobile health system supporting search function and decryption verification.
J. Ambient Intell. Humaniz. Comput., 2021
CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks.
J. Inf. Secur. Appl., 2021
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage.
J. Inf. Secur. Appl., 2021
Toward Invisible Adversarial Examples Against DNN-Based Privacy Leakage for Internet of Things.
IEEE Internet Things J., 2021
Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Certificateless Authentication and Consensus for the Blockchain-Based Smart Grid.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
2020
A heterogeneous user authentication and key establishment for mobile client-server environment.
Wirel. Networks, 2020
An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs.
Veh. Commun., 2020
An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs.
IEEE Trans. Veh. Technol., 2020
Authenticated key agreement for blockchain-based WBAN.
Telecommun. Syst., 2020
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing.
Sensors, 2020
Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information.
Quantum Inf. Process., 2020
Quantum designated verifier signature based on Bell states.
Quantum Inf. Process., 2020
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks.
Mob. Networks Appl., 2020
Certificateless public key encryption with cryptographic reverse firewalls.
J. Syst. Archit., 2020
A cloud data deduplication scheme based on certificateless proxy re-encryption.
J. Syst. Archit., 2020
An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments.
J. Syst. Archit., 2020
Certificateless authenticated key agreement for blockchain-based WBANs.
J. Syst. Archit., 2020
A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud.
J. Syst. Archit., 2020
An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs.
J. Syst. Archit., 2020
A bandwidth efficient HMAC-based authentication scheme for network coding.
J. Inf. Secur. Appl., 2020
Attribute Based Encryption with Efficient Revocation from Lattices.
Int. J. Netw. Secur., 2020
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT.
IACR Cryptol. ePrint Arch., 2020
An efficient and practical certificateless signcryption scheme for wireless body area networks.
Comput. Commun., 2020
Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems.
IEEE Access, 2020
2019
AKAIoTs: authenticated key agreement for Internet of Things.
Wirel. Networks, 2019
A combined public-key scheme in the case of attribute-based for wireless body area networks.
Wirel. Networks, 2019
Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey.
Veh. Commun., 2019
Certificateless deniably authenticated encryption and its application to e-voting system.
Telecommun. Syst., 2019
A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid.
Telecommun. Syst., 2019
ASDS: Attribute-based secure data sharing scheme for reliable cloud environment.
Secur. Priv., 2019
Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity.
Mob. Networks Appl., 2019
An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid.
J. Syst. Archit., 2019
A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs.
J. Syst. Archit., 2019
Efficient Signcryption With Proxy Re-Encryption and its Application in Smart Grid.
IEEE Internet Things J., 2019
A Blockchain-Based Access Control Scheme for Smart Grids.
IACR Cryptol. ePrint Arch., 2019
Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system.
Ann. des Télécommunications, 2019
A Privacy-Preserving RLWE-Based Remote Biometric Authentication Scheme for Single and Multi-Server Environments.
IEEE Access, 2019
A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures.
IEEE Access, 2019
A Blockchain-Based Medical Data Sharing and Protection Scheme.
IEEE Access, 2019
Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding.
IEEE Access, 2019
A Lightweight Certificateless User Authentication Scheme for Mobile Environment.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Cryptographic Reverse Firewalls for Identity-Based Encryption.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Certificateless Authenticated Key Agreement for Decentralized WBANs.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
2018
HOOSC: heterogeneous online/offline signcryption for the Internet of Things.
Wirel. Networks, 2018
Practical deniable authentication for pervasive computing environments.
Wirel. Networks, 2018
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption.
Wirel. Commun. Mob. Comput., 2018
Cost-Effective and Anonymous Access Control for Wireless Body Area Networks.
IEEE Syst. J., 2018
Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
Sensors, 2018
Heterogeneous signcryption with keyword search for wireless body area network.
Secur. Priv., 2018
Large universe attribute based access control with efficient decryption in cloud storage system.
J. Syst. Softw., 2018
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.
J. Medical Syst., 2018
An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks.
J. Medical Syst., 2018
An efficient certificateless user authentication and key exchange protocol for client-server environment.
J. Ambient Intell. Humaniz. Comput., 2018
Remote Authentication Schemes for Wireless Body Area Networks Based on the Internet of Things.
IEEE Internet Things J., 2018
Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing.
Inf., 2018
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Gener. Comput. Syst., 2018
Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement.
Comput. Stand. Interfaces, 2018
Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test.
IEEE Access, 2018
Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Certificateless online/offline signcryption for the Internet of Things.
Wirel. Networks, 2017
An Efficient Remote Authentication Scheme for Wireless Body Area Network.
J. Medical Syst., 2017
A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment.
Int. J. Netw. Secur., 2017
Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol.
Int. J. Netw. Secur., 2017
Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map.
Int. J. Netw. Secur., 2017
Efficient certificateless access control for industrial Internet of Things.
Future Gener. Comput. Syst., 2017
An efficient signcryption for data access control in cloud computing.
Computing, 2017
Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption.
Proceedings of the Information Technology and Applied Mathematics - ICITAM 2017, Haldia, Purba Medinipur, West Bengal, India, October 30, 2017
A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment.
Proceedings of the Advances in Internetworking, 2017
2016
Practical Signcryption for Secure Communication of Wireless Sensor Networks.
Wirel. Pers. Commun., 2016
Efficient Deniably Authenticated Encryption and Its Application to E-Mail.
IEEE Trans. Inf. Forensics Secur., 2016
Identity-based deniable authenticated encryption and its application to e-mail system.
Telecommun. Syst., 2016
Secure and efficient data transmission in the Internet of Things.
Telecommun. Syst., 2016
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems.
Symmetry, 2016
A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks.
Secur. Commun. Networks, 2016
A Provably-Secure Transmission Scheme for Wireless Body Area Networks.
J. Medical Syst., 2016
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Syst., 2016
Secure mobile agent-based English auction protocol using identity-based signature scheme.
Int. J. Secur. Networks, 2016
A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT.
Int. J. Netw. Secur., 2016
User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System.
Int. J. Netw. Secur., 2016
Practical access control for sensor networks in the context of the Internet of Things.
Comput. Commun., 2016
2015
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
Wirel. Pers. Commun., 2015
An Efficient Identity-Based Deniable Authenticated Encryption Scheme.
KSII Trans. Internet Inf. Syst., 2015
Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme.
Inf., 2015
On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing.
Int. J. Netw. Secur., 2015
Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data.
Int. J. Netw. Secur., 2015
An efficient certificateless deniable authentication protocol without pairings.
Int. J. Electron. Secur. Digit. Forensics, 2015
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings.
Comput. J., 2015
DiSNPindel: improved intra-individual SNP and InDel detection in direct amplicon sequencing of a diploid.
BMC Bioinform., 2015
ID-Based Deniable Threshold Ring Authentication.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
2014
A Provably Secure Certificate Based Ring Signature Without Pairing.
Int. J. Netw. Secur., 2014
Improvement on a Knapsack-Based Probabilistic Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Identity-based deniable authentication for ad hoc networks.
Computing, 2014
Broadcast Searchable Keyword Encryption.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2013
Cryptanalysis and Improvement of Robust Deniable Authentication Protocol.
Wirel. Pers. Commun., 2013
Efficient Signcryption for Heterogeneous Systems.
IEEE Syst. J., 2013
Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model.
Secur. Commun. Networks, 2013
Identity-based partially blind signature in the standard model for electronic cash.
Math. Comput. Model., 2013
Secure identity-based signcryption in the standard model.
Math. Comput. Model., 2013
Certificateless hybrid signcryption.
Math. Comput. Model., 2013
New identity-based three-party authenticated key agreement protocol with provable security.
J. Netw. Comput. Appl., 2013
Certificateless threshold signature secure in the standard model.
Inf. Sci., 2013
An efficient certificateless aggregate signature with constant pairing computations.
Inf. Sci., 2013
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
A novel certificateless deniable authentication protocol.
IACR Cryptol. ePrint Arch., 2013
Lattice-based signcryption.
Concurr. Comput. Pract. Exp., 2013
Efficient communication scheme with confidentiality and privacy for vehicular networks.
Comput. Electr. Eng., 2013
2012
Practical Identity-Based Signature for Wireless Sensor Networks.
IEEE Wirel. Commun. Lett., 2012
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy.
Secur. Commun. Networks, 2012
Provably secure and efficient certificateless authenticated tripartite key agreement protocol.
Math. Comput. Model., 2012
Identity-based online/offline signcryption for low power devices.
J. Netw. Comput. Appl., 2012
Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks.
IEICE Trans. Inf. Syst., 2012
Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
A biometric identity-based signcryption scheme.
Future Gener. Comput. Syst., 2012
Bidder-anonymous English auction protocol based on revocable ring signature.
Expert Syst. Appl., 2012
Efficient signcryption in the standard model.
Concurr. Comput. Pract. Exp., 2012
Efficient and multi-level privacy-preserving communication protocol for VANET.
Comput. Electr. Eng., 2012
Further improvement of an identity-based signcryption scheme in the standard model.
Comput. Electr. Eng., 2012
2011
A Certificateless Proxy Ring Signature Scheme with Provable Security.
Int. J. Netw. Secur., 2011
Analysis of an Identity-Based Signcryption Scheme in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
An Improved Authenticated Encryption Scheme.
IEICE Trans. Inf. Syst., 2011
Cryptanalysis of an Identity Based Signcryption without Random Oracles.
Fundam. Informaticae, 2011
On the security of an identity based multi-proxy signature scheme.
Comput. Electr. Eng., 2011
Efficient Identity-Based Signcryption in the Standard Model.
Proceedings of the Provable Security - 5th International Conference, 2011
2010
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography.
Informatica, 2010
Identity-based Threshold Signature Secure in the Standard Model.
Int. J. Netw. Secur., 2010
Cryptanalysis of efficient proxy signature schemes for mobile communication.
Sci. China Inf. Sci., 2010
2009
An Anonymous Sealed-bid Electronic Auction Based on Ring Signature.
Int. J. Netw. Secur., 2009
Identity-Based Hybrid Signcryption.
IACR Cryptol. ePrint Arch., 2009
An Identity-Based Restricted Deniable Authentication Protocol.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
ID-based threshold proxy signcryption scheme from bilinear pairings.
Int. J. Secur. Networks, 2008
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
On the Role of PKG for Proxy Re-encryption in Identity Based Setting.
IACR Cryptol. ePrint Arch., 2008
An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2008
Analysis and Improvement of Authenticatable Ring Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2008
An Improved Certificateless Signature Scheme Secure in the Standard Model.
Fundam. Informaticae, 2008
Indentity-based broadcast signcryption.
Comput. Stand. Interfaces, 2008
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
Deniable Proxy-Anonymous Signatures.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Efficient Signcryption Key Encapsulation without Random Oracles.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Simulatability and Security of Certificateless Threshold Signatures without Random Oracles.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
Key management in ad hoc networks using self-certified public key system.
Int. J. Mob. Commun., 2007
Security Analysis of the Pomykala-Barabasz Scheme.
Fundam. Informaticae, 2007
Provably Secure Identity-Based Threshold Unsigncryption Scheme.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption.
Int. J. Netw. Secur., 2006
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2006
ID-Based ( <i>t</i> , <i>n</i> ) Threshold Proxy Signcryption for Multi-agent Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
ID-Based Threshold Unsigncryption Scheme from Pairings.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005