Fagen Li

Orcid: 0000-0001-6289-1265

According to our database1, Fagen Li authored at least 211 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2025

Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing.
Future Gener. Comput. Syst., 2025

Multi-Scale Convolutional Neural Networks optimized by elite strategy dung beetle optimization algorithm for encrypted traffic classification.
Expert Syst. Appl., 2025

2024
An anonymous broadcasting system with accountability based on group signatures.
Telecommun. Syst., October, 2024

A new construction of public key authenticated encryption with keyword search based on LWE.
Telecommun. Syst., June, 2024

A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability.
Telecommun. Syst., May, 2024

Blockchain-Based Privacy-Preserving Authentication With Hierarchical Access Control Using Polynomial Commitment for Mobile Cloud Computing.
IEEE Internet Things J., May, 2024

Versatile Remote Data Checking Scheme for Cloud-Assisted Internet of Things.
IEEE Internet Things J., April, 2024

A pairing-free certificateless authenticated searchable encryption with multi-trapdoor indistinguishability (MTP-IND) guarantees.
Telecommun. Syst., March, 2024

Secure quantum signature scheme without entangled state.
Quantum Inf. Process., February, 2024

Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement.
Quantum Inf. Process., February, 2024

Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage.
J. Syst. Archit., 2024

A randomized encryption deduplication method against frequency attack.
J. Inf. Secur. Appl., 2024

PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption.
J. Inf. Secur. Appl., 2024

An efficient secure interval test protocol for small integers.
J. Inf. Secur. Appl., 2024

A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application.
J. Inf. Secur. Appl., 2024

A majority affiliation based under-sampling method for class imbalance problem.
Inf. Sci., 2024

A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks.
Expert Syst. Appl., 2024

Computer vision based distributed denial of service attack detection for resource-limited devices.
Comput. Electr. Eng., 2024

Model-agnostic generation-enhanced technology for few-shot intrusion detection.
Appl. Intell., 2024

LA-IMDCN: A Lightweight Authentication Scheme With Smart Contract in Implantable Medical Device Communication Networks.
IEEE Access, 2024

Local Augmentation with Functionality-Preservation for Semi-Supervised Graph Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Guest editorial: Special issue on frontiers in cyber security.
J. Syst. Archit., December, 2023

Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation.
Peer Peer Netw. Appl., November, 2023

A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing.
J. Syst. Archit., September, 2023

Solving Restricted Preemptive Scheduling on Parallel Machines with SAT and PMS.
J. Univers. Comput. Sci., August, 2023

Traffic data extraction and labeling for machine learning based attack detection in IoT networks.
Int. J. Mach. Learn. Cybern., July, 2023

Efficient and Secure Certificateless Signcryption Without Pairing for Edge Computing-Based Internet of Vehicles.
IEEE Trans. Veh. Technol., May, 2023

HAP-SG: Heterogeneous authentication protocol for smart grid.
Peer Peer Netw. Appl., May, 2023

Mitigation of a poisoning attack in federated learning by using historical distance detection.
Ann. des Télécommunications, April, 2023

A privacy preserving federated learning scheme using homomorphic encryption and secret sharing.
Telecommun. Syst., March, 2023

Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT.
IEEE Syst. J., March, 2023

An efficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles.
J. Syst. Archit., March, 2023

Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage.
IEEE Trans. Cloud Comput., 2023

ECAAP-SG: Efficient certificateless anonymous authentication protocol for SG.
Secur. Priv., 2023

A lightweight encrypted deduplication scheme supporting backup.
J. Syst. Archit., 2023

A group key agreement protocol based on ECDH and short signature.
J. Inf. Secur. Appl., 2023

Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.
Proceedings of the Provable and Practical Security, 2023

2022
A provably secure free-pairing certificateless searchable encryption scheme.
Telecommun. Syst., 2022

A computationally efficient HMAC-based authentication scheme for network coding.
Telecommun. Syst., 2022

An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services.
IEEE Trans. Cloud Comput., 2022

Quantum public-key designated verifier signature.
Quantum Inf. Process., 2022

A two rounds dynamic authenticated group key agreement protocol based on LWE.
J. Syst. Archit., 2022

Offline/Online lattice-based ciphertext policy attribute-based encryption.
J. Syst. Archit., 2022

Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks.
Inf. Sci., 2022

A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles.
IEEE Internet Things J., 2022

A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things.
IEEE Internet Things J., 2022

A survey of lattice based expressive attribute based encryption.
Comput. Sci. Rev., 2022

A Secure User Authentication Protocol for Heterogeneous Mobile Environments.
IEEE Access, 2022

2021
A public key encryption scheme based on a new variant of LWE with small cipher size.
J. Syst. Archit., 2021

Comments on an identity-based signature scheme for VANETs.
J. Syst. Archit., 2021

An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks.
J. Syst. Archit., 2021

Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability.
J. Syst. Archit., 2021

Digital signature with cryptographic reverse firewalls.
J. Syst. Archit., 2021

An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification.
J. Syst. Archit., 2021

Secure mobile health system supporting search function and decryption verification.
J. Ambient Intell. Humaniz. Comput., 2021

CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks.
J. Inf. Secur. Appl., 2021

PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage.
J. Inf. Secur. Appl., 2021

Toward Invisible Adversarial Examples Against DNN-Based Privacy Leakage for Internet of Things.
IEEE Internet Things J., 2021

Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Certificateless Authentication and Consensus for the Blockchain-Based Smart Grid.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
A heterogeneous user authentication and key establishment for mobile client-server environment.
Wirel. Networks, 2020

An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs.
Veh. Commun., 2020

An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs.
IEEE Trans. Veh. Technol., 2020

Authenticated key agreement for blockchain-based WBAN.
Telecommun. Syst., 2020

A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing.
Sensors, 2020

Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information.
Quantum Inf. Process., 2020

Quantum designated verifier signature based on Bell states.
Quantum Inf. Process., 2020

IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks.
Mob. Networks Appl., 2020

Certificateless public key encryption with cryptographic reverse firewalls.
J. Syst. Archit., 2020

A cloud data deduplication scheme based on certificateless proxy re-encryption.
J. Syst. Archit., 2020

An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments.
J. Syst. Archit., 2020

Certificateless authenticated key agreement for blockchain-based WBANs.
J. Syst. Archit., 2020

A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud.
J. Syst. Archit., 2020

An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs.
J. Syst. Archit., 2020

A bandwidth efficient HMAC-based authentication scheme for network coding.
J. Inf. Secur. Appl., 2020

Attribute Based Encryption with Efficient Revocation from Lattices.
Int. J. Netw. Secur., 2020

Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT.
IACR Cryptol. ePrint Arch., 2020

An efficient and practical certificateless signcryption scheme for wireless body area networks.
Comput. Commun., 2020

Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems.
IEEE Access, 2020

2019
AKAIoTs: authenticated key agreement for Internet of Things.
Wirel. Networks, 2019

A combined public-key scheme in the case of attribute-based for wireless body area networks.
Wirel. Networks, 2019

Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey.
Veh. Commun., 2019

Certificateless deniably authenticated encryption and its application to e-voting system.
Telecommun. Syst., 2019

A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid.
Telecommun. Syst., 2019

ASDS: Attribute-based secure data sharing scheme for reliable cloud environment.
Secur. Priv., 2019

Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity.
Mob. Networks Appl., 2019

An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid.
J. Syst. Archit., 2019

A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs.
J. Syst. Archit., 2019

Efficient Signcryption With Proxy Re-Encryption and its Application in Smart Grid.
IEEE Internet Things J., 2019

A Blockchain-Based Access Control Scheme for Smart Grids.
IACR Cryptol. ePrint Arch., 2019

Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system.
Ann. des Télécommunications, 2019

A Privacy-Preserving RLWE-Based Remote Biometric Authentication Scheme for Single and Multi-Server Environments.
IEEE Access, 2019

A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures.
IEEE Access, 2019

A Blockchain-Based Medical Data Sharing and Protection Scheme.
IEEE Access, 2019

Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding.
IEEE Access, 2019

A Lightweight Certificateless User Authentication Scheme for Mobile Environment.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Cryptographic Reverse Firewalls for Identity-Based Encryption.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Certificateless Authenticated Key Agreement for Decentralized WBANs.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

2018
HOOSC: heterogeneous online/offline signcryption for the Internet of Things.
Wirel. Networks, 2018

Practical deniable authentication for pervasive computing environments.
Wirel. Networks, 2018

An Anonymous Multireceiver with Online/Offline Identity-Based Encryption.
Wirel. Commun. Mob. Comput., 2018

Cost-Effective and Anonymous Access Control for Wireless Body Area Networks.
IEEE Syst. J., 2018

Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
Sensors, 2018

Heterogeneous signcryption with keyword search for wireless body area network.
Secur. Priv., 2018

Large universe attribute based access control with efficient decryption in cloud storage system.
J. Syst. Softw., 2018

Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.
J. Medical Syst., 2018

An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks.
J. Medical Syst., 2018

An efficient certificateless user authentication and key exchange protocol for client-server environment.
J. Ambient Intell. Humaniz. Comput., 2018

Remote Authentication Schemes for Wireless Body Area Networks Based on the Internet of Things.
IEEE Internet Things J., 2018

Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing.
Inf., 2018

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Gener. Comput. Syst., 2018

Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement.
Comput. Stand. Interfaces, 2018

Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test.
IEEE Access, 2018

Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Certificateless online/offline signcryption for the Internet of Things.
Wirel. Networks, 2017

An Efficient Remote Authentication Scheme for Wireless Body Area Network.
J. Medical Syst., 2017

A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment.
Int. J. Netw. Secur., 2017

Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol.
Int. J. Netw. Secur., 2017

Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map.
Int. J. Netw. Secur., 2017

Efficient certificateless access control for industrial Internet of Things.
Future Gener. Comput. Syst., 2017

An efficient signcryption for data access control in cloud computing.
Computing, 2017

Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption.
Proceedings of the Information Technology and Applied Mathematics - ICITAM 2017, Haldia, Purba Medinipur, West Bengal, India, October 30, 2017

A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment.
Proceedings of the Advances in Internetworking, 2017

2016
Practical Signcryption for Secure Communication of Wireless Sensor Networks.
Wirel. Pers. Commun., 2016

Efficient Deniably Authenticated Encryption and Its Application to E-Mail.
IEEE Trans. Inf. Forensics Secur., 2016

Identity-based deniable authenticated encryption and its application to e-mail system.
Telecommun. Syst., 2016

Secure and efficient data transmission in the Internet of Things.
Telecommun. Syst., 2016

A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems.
Symmetry, 2016

A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks.
Secur. Commun. Networks, 2016

A Provably-Secure Transmission Scheme for Wireless Body Area Networks.
J. Medical Syst., 2016

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Syst., 2016

Secure mobile agent-based English auction protocol using identity-based signature scheme.
Int. J. Secur. Networks, 2016

A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT.
Int. J. Netw. Secur., 2016

User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System.
Int. J. Netw. Secur., 2016

Practical access control for sensor networks in the context of the Internet of Things.
Comput. Commun., 2016

2015
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
Wirel. Pers. Commun., 2015

An Efficient Identity-Based Deniable Authenticated Encryption Scheme.
KSII Trans. Internet Inf. Syst., 2015

Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme.
Inf., 2015

On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing.
Int. J. Netw. Secur., 2015

Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data.
Int. J. Netw. Secur., 2015

An efficient certificateless deniable authentication protocol without pairings.
Int. J. Electron. Secur. Digit. Forensics, 2015

Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings.
Comput. J., 2015

DiSNPindel: improved intra-individual SNP and InDel detection in direct amplicon sequencing of a diploid.
BMC Bioinform., 2015

ID-Based Deniable Threshold Ring Authentication.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
A Provably Secure Certificate Based Ring Signature Without Pairing.
Int. J. Netw. Secur., 2014

Improvement on a Knapsack-Based Probabilistic Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Identity-based deniable authentication for ad hoc networks.
Computing, 2014

Broadcast Searchable Keyword Encryption.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Cryptanalysis and Improvement of Robust Deniable Authentication Protocol.
Wirel. Pers. Commun., 2013

Efficient Signcryption for Heterogeneous Systems.
IEEE Syst. J., 2013

Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model.
Secur. Commun. Networks, 2013

Identity-based partially blind signature in the standard model for electronic cash.
Math. Comput. Model., 2013

Secure identity-based signcryption in the standard model.
Math. Comput. Model., 2013

Certificateless hybrid signcryption.
Math. Comput. Model., 2013

New identity-based three-party authenticated key agreement protocol with provable security.
J. Netw. Comput. Appl., 2013

Certificateless threshold signature secure in the standard model.
Inf. Sci., 2013

An efficient certificateless aggregate signature with constant pairing computations.
Inf. Sci., 2013

Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A novel certificateless deniable authentication protocol.
IACR Cryptol. ePrint Arch., 2013

Lattice-based signcryption.
Concurr. Comput. Pract. Exp., 2013

Efficient communication scheme with confidentiality and privacy for vehicular networks.
Comput. Electr. Eng., 2013

2012
Practical Identity-Based Signature for Wireless Sensor Networks.
IEEE Wirel. Commun. Lett., 2012

Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy.
Secur. Commun. Networks, 2012

Provably secure and efficient certificateless authenticated tripartite key agreement protocol.
Math. Comput. Model., 2012

Identity-based online/offline signcryption for low power devices.
J. Netw. Comput. Appl., 2012

Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks.
IEICE Trans. Inf. Syst., 2012

Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A biometric identity-based signcryption scheme.
Future Gener. Comput. Syst., 2012

Bidder-anonymous English auction protocol based on revocable ring signature.
Expert Syst. Appl., 2012

Efficient signcryption in the standard model.
Concurr. Comput. Pract. Exp., 2012

Efficient and multi-level privacy-preserving communication protocol for VANET.
Comput. Electr. Eng., 2012

Further improvement of an identity-based signcryption scheme in the standard model.
Comput. Electr. Eng., 2012

2011
A Certificateless Proxy Ring Signature Scheme with Provable Security.
Int. J. Netw. Secur., 2011

Analysis of an Identity-Based Signcryption Scheme in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

An Improved Authenticated Encryption Scheme.
IEICE Trans. Inf. Syst., 2011

Cryptanalysis of an Identity Based Signcryption without Random Oracles.
Fundam. Informaticae, 2011

On the security of an identity based multi-proxy signature scheme.
Comput. Electr. Eng., 2011

Efficient Identity-Based Signcryption in the Standard Model.
Proceedings of the Provable Security - 5th International Conference, 2011

2010
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography.
Informatica, 2010

Identity-based Threshold Signature Secure in the Standard Model.
Int. J. Netw. Secur., 2010

Cryptanalysis of efficient proxy signature schemes for mobile communication.
Sci. China Inf. Sci., 2010

2009
An Anonymous Sealed-bid Electronic Auction Based on Ring Signature.
Int. J. Netw. Secur., 2009

Identity-Based Hybrid Signcryption.
IACR Cryptol. ePrint Arch., 2009

An Identity-Based Restricted Deniable Authentication Protocol.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
ID-based threshold proxy signcryption scheme from bilinear pairings.
Int. J. Secur. Networks, 2008

Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

On the Role of PKG for Proxy Re-encryption in Identity Based Setting.
IACR Cryptol. ePrint Arch., 2008

An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2008

Analysis and Improvement of Authenticatable Ring Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2008

An Improved Certificateless Signature Scheme Secure in the Standard Model.
Fundam. Informaticae, 2008

Indentity-based broadcast signcryption.
Comput. Stand. Interfaces, 2008

Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

Deniable Proxy-Anonymous Signatures.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Efficient Signcryption Key Encapsulation without Random Oracles.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Simulatability and Security of Certificateless Threshold Signatures without Random Oracles.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

On the Security of Online/Offline Signatures and Multisignatures from ACISP'06.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Key management in ad hoc networks using self-certified public key system.
Int. J. Mob. Commun., 2007

Security Analysis of the Pomykala-Barabasz Scheme.
Fundam. Informaticae, 2007

Provably Secure Identity-Based Threshold Unsigncryption Scheme.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption.
Int. J. Netw. Secur., 2006

Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2006

ID-Based ( <i>t</i> , <i>n</i> ) Threshold Proxy Signcryption for Multi-agent Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
ID-Based Threshold Unsigncryption Scheme from Pairings.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005


  Loading...