Search for persons
X
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022 ,
7
Public Key Encryption with Hierarchical Authorized Keyword ..:
, In:
?
Advances in Information and Computer Security; Lecture Notes in Computer Science ,
8
Quantum-Resistant 1-out-of-N Oblivious Signatures from Latt..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
11
Blockchain-Based Self-Sovereign Identity System with Attrib..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
12
Public-key Authenticated Encryption with Keyword Search ..:
, In:
?
2022 17th Asia Joint Conference on Information Security (AsiaJCIS) ,
15