林喜军
发布者:张亚健发布时间:2021-10-11浏览次数:150
- 1.
Cryptanalysis of An Anonymous and Traceable Group Data Sharing in Cloud Computing,
IEEE Transactions on Information Forensics & Security,
2021,
,
- 2.
dentity-Based Encryption with Equality Test and Datestamp-Based Authorization Mechanism,
Theoretical Computer Science,
2021,
,
- 3.
Public key encryption supporting equality test and flexible authorization without bilinear pairings,
Computer Communications,
2021,
,
- 4.
Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks,
The Computer Journal,
2020,
,
- 5.
Leakage-free ID-based Signature, Revisited,
The Computer Journal,
2019,
,
- 6.
On the Security of A Certificateless Signcryption with Known Session-specific Temporary Information Security in the Standard Model,
The Computer Journal,
2019,
,
- 7.
Cryptanalysis of A Compact Anonymous HIBE with Constant Size Private Key,
The Computer Journal,
2019,
,
- 8.
On the Security of Secure Server-Designation Public Key Encryption with Keyword Search,
The Computer Journal,
2018,
,
- 9.
Certificateless public key encryption with equality test,
Information Sciences,
2018,
,
- 10.
Generic construction of public key encryption, identity-based encryption and signcryption with equality test,
Information Sciences,
2018,
,
- 11.
Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme,
The Computer Journal,
2018,
,
- 12.
An Efficient RSA-based Certificateless Public Key Encryption Scheme,
Discrete Applied Mathematics,
2017,
,
- 13.
Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme,
The Computer Journal,
2016,
,
- 14.
Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications,
Computers & Security,
2015,
,
- 15.
Comment on “Identity-based non-interactive key distribution with forward security”,
Designs, Codes and Cryptography,
2015,
,
- 16.
Many-to-one Encryption and Authentication Scheme and Its Application,
Journal of Commun.and Networks,
2008,
,
- 17.
Analysis of An Authenticated Identity-Based Multicast Scheme,
IET Communication,
2008,
,