| Publication | Date of Publication | Type |
|---|
Material point method simulation approach to hydraulic fracturing in porous medium Engineering Analysis with Boundary Elements | 2024-05-29 | Paper |
Material point method for the propagation of multiple branched cracks based on classical fracture mechanics Computer Methods in Applied Mechanics and Engineering | 2021-11-16 | Paper |
Escrow free attribute-based signature with self-revealability Information Sciences | 2020-01-06 | Paper |
A reduction of security notions in designated confirmer signatures Theoretical Computer Science | 2016-02-18 | Paper |
Designated confirmer signatures with unified verification Cryptography and Coding | 2011-12-16 | Paper |
Universal forgery on a group signature scheme using self-certified public keys Information Processing Letters | 2009-07-09 | Paper |
Formal Definition and Construction of Nominative Signature Information and Communications Security | 2008-03-25 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Insider attacks on multi-proxy multi-signature schemes Computers and Electrical Engineering | 2007-03-02 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Analysis and improvement of a multisecret sharing authenticating scheme | 2006-10-04 | Paper |
scientific article; zbMATH DE number 2247709 (Why is no real title available?) | 2006-01-16 | Paper |
Automata, Languages and Programming Lecture Notes in Computer Science | 2006-01-10 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Efficient and robust key management for large mobile ad hoc networks Computer Networks | 2005-08-03 | Paper |
scientific article; zbMATH DE number 2127888 (Why is no real title available?) | 2005-01-14 | Paper |
scientific article; zbMATH DE number 2114005 (Why is no real title available?) | 2004-11-05 | Paper |
scientific article; zbMATH DE number 2080694 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 1950605 (Why is no real title available?) | 2003-07-17 | Paper |