Publication Venue For ABKS-CSC: attribute-based keyword search with constant-size ciphertexts 2016 Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs 2016 Privacy-preserving grouping proof with key exchange in the multiple-party setting 2016 SAKE: scalable authenticated key exchange for mobile e-health networks 2016 A provably secure identity-based proxy ring signature based on RSA 2015 A resilient identity-based authenticated key exchange protocol 2015 Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information 2015 Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature 2015 A robust smart card-based anonymous user authentication protocol for wireless communications 2014 Efficient public key encryption with revocable keyword search 2014
Publication Venue For ABKS-CSC: attribute-based keyword search with constant-size ciphertexts 2016 Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs 2016 Privacy-preserving grouping proof with key exchange in the multiple-party setting 2016 SAKE: scalable authenticated key exchange for mobile e-health networks 2016 A provably secure identity-based proxy ring signature based on RSA 2015 A resilient identity-based authenticated key exchange protocol 2015 Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information 2015 Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature 2015 A robust smart card-based anonymous user authentication protocol for wireless communications 2014 Efficient public key encryption with revocable keyword search 2014