Identity-Based Matchmaking Encryption with Equality Test.
Entropy, January, 2024
On the Unforgeability of "Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET".
IEEE Trans. Inf. Forensics Secur., 2024
On The Security Of A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks.
Comput. J., 2024
Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems.
J. Syst. Archit., September, 2023
Cryptanalysis of an Anonymous and Traceable Group Data Sharing in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2021
Identity-based encryption with equality test and datestamp-based authorization mechanism.
Theor. Comput. Sci., 2021
Public key encryption supporting equality test and flexible authorization without bilinear pairings.
Comput. Commun., 2021
Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2021
On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model.
Comput. J., 2020
Leakage-free ID-Based Signature, Revisited.
Comput. J., 2020
Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys.
Comput. J., 2019
Certificateless public key encryption with equality test.
Inf. Sci., 2018
Generic construction of public key encryption, identity-based encryption and signcryption with equality test.
Inf. Sci., 2018
Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames.
IEICE Trans. Inf. Syst., 2018
An efficient RSA-based certificateless public key encryption scheme.
Discret. Appl. Math., 2018
On the Security of Secure Server-Designation Public Key Encryption with Keyword Search.
Comput. J., 2018
Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme.
Comput. J., 2018
Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.
Comput. J., 2017
A Passive Client-based Approach to Detect Evil Twin Attacks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations.
IACR Cryptol. ePrint Arch., 2016
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2016
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2016
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential.
IACR Cryptol. ePrint Arch., 2015
Comment on "Identity-based non-interactive key distribution with forward security".
Des. Codes Cryptogr., 2015
Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications.
Comput. Secur., 2015
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2013
Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications.
IACR Cryptol. ePrint Arch., 2013
Fully Deniable Mutual Authentication Protocol Based on RSA Signature.
IACR Cryptol. ePrint Arch., 2013
Efficient CCA-secure Threshold Public-Key Encryption Scheme.
IACR Cryptol. ePrint Arch., 2013
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks.
IACR Cryptol. ePrint Arch., 2013
Cheating immune visual cryptography scheme.
IET Inf. Secur., 2011
Step construction of visual cryptography schemes.
IEEE Trans. Inf. Forensics Secur., 2010
A new definition of the contrast of visual cryptography scheme.
Inf. Process. Lett., 2010
Some Extensions on Threshold Visual Cryptography Schemes.
Comput. J., 2010
The alignment problem of visual cryptography schemes.
Des. Codes Cryptogr., 2009
Many-to-one encryption and authentication scheme and its application.
J. Commun. Networks, 2008
Colour visual cryptography schemes.
IET Inf. Secur., 2008
Analysis of an authenticated identity-based multicast scheme.
IET Commun., 2008