Search for persons
X
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022 ,
3
Public Key Encryption with Hierarchical Authorized Keyword ..:
, In:
?
Advances in Information and Computer Security; Lecture Notes in Computer Science ,
5
Quantum-Resistant 1-out-of-N Oblivious Signatures from Latt..:
, In:
?
2022 17th Asia Joint Conference on Information Security (AsiaJCIS) ,
6
Cryptanalysis to Ming et al.'s Revocable Multi-Authority At..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
7
Public-key Authenticated Encryption with Keyword Search ..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
8
Blockchain-Based Confidential Payment System with Controlla..:
, In:
?
2022 17th Asia Joint Conference on Information Security (AsiaJCIS) ,
9
Message from the Program Co-Chairs: AsiaJCIS 2022:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
12