| Publication | Date of Publication | Type |
|---|
| Towards privacy-preserving category-aware POI recommendation over encrypted LBSN data | 2024-04-30 | Paper |
| Efficient and privacy-preserving tree-based inference via additive homomorphic encryption | 2023-11-01 | Paper |
| Efficient and secure outsourcing of differentially private data publication | 2022-08-25 | Paper |
| Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data | 2020-12-10 | Paper |
| A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps | 2019-03-27 | Paper |
| Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases | 2017-09-07 | Paper |
| Comment on “An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding” | 2017-05-16 | Paper |
| A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains | 2017-05-16 | Paper |
| User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption | 2017-05-16 | Paper |
| Proxy Re-encryption with Delegatable Verifiability | 2016-09-02 | Paper |
| RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security | 2015-09-29 | Paper |
| EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption | 2014-07-29 | Paper |
| Querying over Encrypted Data in Smart Grids | 2014-07-23 | Paper |
| Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque | 2009-01-09 | Paper |
| A simple deniable authentication protocol based on the Diffie–Hellman algorithm | 2008-09-24 | Paper |
| Designing efficient proxy signature schemes for mobile communication | 2008-04-15 | Paper |
| New \((t, n)\) threshold directed signature scheme with provable security | 2008-01-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5431933 | 2008-01-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3594281 | 2007-08-07 | Paper |
| Password-based group key agreement protocol for client-server application | 2007-06-01 | Paper |
| An efficient provable secure ID-based proxy signature scheme based on CDH assumption | 2007-05-09 | Paper |
| An improved deniable authentication protocol | 2007-02-02 | Paper |
| Proofs of security for improved Rabin signature scheme | 2006-11-15 | Paper |
| An ID-based authenticated key agreement protocol for peer-to-peer computing | 2006-11-15 | Paper |
| A self-encryption remote user anonymous authentication scheme using smart cards | 2006-11-15 | Paper |
| Cryptology and Network Security | 2006-11-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5469713 | 2006-05-26 | Paper |
| Designated verifier proxy signature scheme with message recovery | 2005-11-14 | Paper |
| Proxy signature scheme using self-certified public keys | 2005-11-14 | Paper |
| A new deniable authentication protocol from bilinear pairings | 2005-11-04 | Paper |
| Efficient remote user authentication scheme using smart card | 2005-10-10 | Paper |
| A robust \((k,n)+1\) threshold proxy signature scheme based on factoring | 2005-08-05 | Paper |
| Provably secure proxy-protected signature schemes based on factoring | 2005-05-04 | Paper |
| Proxy blind multi-signature scheme without a secure channel | 2005-05-04 | Paper |
| Threshold undeniable signature scheme based on conic | 2005-02-22 | Paper |