| Publication | Date of Publication | Type |
|---|
| Password authenticated key exchange and protected password change protocols | 2019-11-13 | Paper |
| An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme | 2019-06-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4640236 | 2018-05-17 | Paper |
| A new proxy signature scheme for a specified group of verifiers | 2014-08-01 | Paper |
| A simple key assignment for access control based on polynomial | 2013-08-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4925072 | 2013-06-11 | Paper |
| A BATCH VERIFICATION FOR MULTIPLE PROXY SIGNATURE | 2012-12-12 | Paper |
| A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks | 2012-06-04 | Paper |
| An efficient key assignment scheme for access control in a large leaf class hierarchy | 2011-03-28 | Paper |
| A simple mobile communication billing system among charged parties | 2010-09-01 | Paper |
| A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM | 2009-06-23 | Paper |
| An efficient multi-round anonymous auction protocol | 2008-03-06 | Paper |
| A new convertible authenticated encryption scheme with message linkages | 2007-03-02 | Paper |
| A password authentication scheme over insecure networks | 2006-06-30 | Paper |
| A secure strong-password authentication protocol | 2006-06-19 | Paper |
| Cryptanalysis and improvement on batch verifying multiple RSA digital signatures | 2006-04-28 | Paper |
| A time-stamping protocol for digital watermarking | 2005-11-14 | Paper |
| The general pay-word: A micro-payment scheme based on \(n\)-dimension one-way hash chain | 2005-08-17 | Paper |
| Simple authenticated key agreement and protected password change protocol | 2005-08-05 | Paper |
| Cryptanalysis of an authenticated encryption scheme using self-certified public keys | 2005-08-05 | Paper |
| A new blind signature based on the discrete logarithm problem for untraceability | 2005-06-13 | Paper |
| An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme | 2005-05-04 | Paper |
| Improvement of signature scheme based on factoring and discrete logarithms | 2005-02-22 | Paper |
| A new proxy signature scheme with revocation | 2005-02-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4825723 | 2004-11-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823656 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823671 | 2004-10-28 | Paper |
| A \((t,n)\) multi-secret sharing scheme | 2004-08-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4473599 | 2004-08-04 | Paper |
| A new digital signature scheme based on factoring and discrete logarithms | 2004-05-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4457764 | 2004-03-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4432963 | 2004-02-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4436119 | 2003-11-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4436090 | 2003-11-23 | Paper |
| A simple remote user authentication scheme | 2003-10-14 | Paper |
| A new key authentication scheme based on discrete logarithms | 2003-09-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4423736 | 2003-09-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4796529 | 2003-05-14 | Paper |
| A threshold decryption scheme without session keys | 2003-02-20 | Paper |
| A new remote user authentication scheme for multi-server architecture | 2003-01-21 | Paper |
| Cryptanalysis of YCN key assignment scheme in a hierarchy | 2002-07-25 | Paper |
| A digital watermarking scheme using human visual effects | 2002-04-15 | Paper |
| Adding timestamps to the secure electronic auction protocol | 2002-03-03 | Paper |
| An improvement of SPLICE/AS in WIDE against guessing attack | 2002-02-28 | Paper |
| Improved digital signature scheme based on factoring and discrete logarithms | 2002-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4796758 | 2002-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4506200 | 2000-11-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4489991 | 2000-10-26 | Paper |
| A virtual image cryptosystem based upon vector quantization | 2000-09-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4948729 | 2000-04-26 | Paper |
| An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies∗ | 2000-04-09 | Paper |
| An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy | 2000-01-20 | Paper |
| A new redundancy reducing cipher | 2000-01-01 | Paper |
| A remote password authentication scheme based on the digital signature method | 1999-04-29 | Paper |
| Multilevel secure database encryption with subkeys | 1998-07-23 | Paper |
| A cryptographic key assignment scheme in a hierarchy for access control | 1998-07-01 | Paper |