的个人主页 http://faculty.uestc.edu.cn/lifagen/zh_CN/index.htm
发表的论文 |
|
2023年 |
|
[106]
|
Zhan Xie, Yong Chen, Ikram Ali, Chengwei Pan, Fagen Li, Wen He. Efficient and secure certificateless signcryption without pairing for edge computing-based internet of vehicles. IEEE Transactions on Vehicular Technology, 2023,72(5): 5642-5653. |
[105]
|
Yuyang Zhou, Zhebin Hu, Fagen Li. Searchable public-key encryption with cryptographic reverse firewalls for cloud storage. IEEE Transactions on Cloud Computing, 2023, 11(1) :383-396, IEEE. |
[104]
|
Zeyu Yang, Ziqing Wang, Fei Qiu, Fagen Li. A group key agreement protocol based on ECDH and short signature. Journal of Information Security and Applications, 2023, 72:103388, Elsevier. |
2022年 |
|
[103]
|
Ling Xiong, Fagen Li, Mingxing He, Zhicai Liu, Tu Peng. An efficient privacy-aware authentication scheme with hierarchical access control for mobile cloud computing services. IEEE Transactions on Cloud Computing, 2022,10(4): 2309-2323, |
[102]
|
Xiangyu Pan, Yuqiao Jin, Ziqing Wang, Fagen Li. A pairing-free heterogeneous signcryption scheme for unmanned aerial vehicles. IEEE Internet of Things Journal,2022, 9(19):19426-19437, IEEE. |
[101]
|
Yuyang Zhou,Liang Zhao,Yuqiao Jin, Fagen Li. Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks. Information Sciences,2022, 604:80-96, Elsevier. |
[100] |
Ziqing Wang, Zeyu Yang, Fagen Li. A two rounds dynamic authenticated group key agreement protocol based on LWE. Journal of Systems Architecture,2022, 133: 102756, Elsevier. |
[99] |
Mohammed Raouf Senouci, Ilyas Benkhaddra, Abdelkader Senouci, Fagen Li. A provably secure free-pairing certificateless searchable encryption scheme.Telecommunication Systems, 2022, 80: 383-395, Springer. |
[98] |
Tandoh Lawrence, Fagen Li, Ikram Ali, Charles R. Haruna, Michael Y. Kpiebaareh, Tandoh Christopher. A computationally efficient HMAC-based authentication scheme for network coding.Telecommunication Systems,2022,79(1):47-69, Springer. |
2021年 |
|
[97]
|
Xuyang Ding, Shuai Zhang, Mengkai Song, Xiaocong Ding, Fagen Li. Towards invisible adversarial examples against DNN-based privacy leakage for Internet of things. IEEE Internet of Things Journal, 2021, 8(2): 802-812, IEEE |
[96] |
Nabeil Eltayieb,Rashad Elhabob,Alzubair Hassan,Fagen Li. Secure mobile health system supporting search function and decryption verification. Journal of Ambient Intelligence and Humanized Computing,2021,12(2), 2221-2231, Springer. |
[95] |
Ziqing Wang, Dianhua Tang, Haomiao Yang, Fagen Li. A public key encryption scheme based on a new variant of LWE with small cipher size. Journal of Systems Architecture, 2021, 117: 102165, Elsevier. |
[94] |
Tandoh Lawrence, Fagen Li, Ikram Ali, Michael Y. Kpiebaareh, Charles R. Haruna, Tandoh Christopher. An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification. Journal of Systems Architecture, 2021, 116: 102051, Elsevier. |
[93] |
Mengdi Ouyang, Ziqing Wang, Fagen Li. Digital signature with cryptographic reverse firewalls. Journal of Systems Architecture, 2021, 116: 102029, Elsevier. |
[92] |
Xiangyu Pan, Fagen Li. Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. Journal of Systems Architecture, 2021,115: 102075, Elsevier. |
2020年 |
|
[91]
|
Ikram Ali, Tandoh Lawrence, Anyembe Andrew Omala, Fagen Li. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Transactions on Vehicular Technology, 2020, 69(10): 11266-11280, IEEE |
[90] |
Fagen Li, Jiye Wang,Yuyang Zhou,Chunhua Jin, SK Hafizul Islam. A heterogeneous user authentication and key establishment for mobile client-server environment.Wireless Networks, 2020, 26(2):913-924, Springer. |
[89] |
Ikram Ali, Fagen Li. An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs.Vehicular Communications, 2020,22:100228, Elsevier. |
[88] |
Ikram Ali, Tandoh Lawrence, Fagen Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 2020,103:101692, Elsevier. |
[87] |
Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li. A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. Journal of Systems Architecture, 2020,102:101653, Elsevier. |
[86] |
Yuyang Zhou, Jing Guo, Fagen Li. Certificateless public key encryption with cryptographic reverse firewalls. Journal of Systems Architecture, 2020,109:101754, Elsevier. |
[85] |
Tandoh Lawrence, Ikram Ali, Tandoh Christopher, Fagen Li. A bandwidth efficient HMAC-based authentication scheme for network coding. Journal of Information Security and Applications, 2020, 55: 102658. |
[84] |
Mwitende Gervais, Ikram Ali, Nabeil Eltayieb, Baocang Wang, Fagen Li. Authenticated key agreement for blockchain-based WBAN. Telecommunication Systems, 2020,74:347-365, Springer |
[83] |
Gervais Mwitende, Yalan Ye, Ikram Ali, Fagen Li. Certificateless authenticated key agreement for blockchain-based WBANs. Journal of Systems Architecture, 2020,110:101777. |
[82] |
Xiaoyu Zheng, Yuyang Zhou, Yalan Ye, Fagen Li. A cloud data deduplication scheme based on certificateless proxy re-encryption. Journal of Systems Architecture, 20 20,102:101666, Elsevier. |
2019年 |
|
[81]
|
Emmanuel Ahene, Zhangchi Qin, Akua Konadu Adusei, Fagen Li. Efficient signcryption with proxy re-encryption and its application in smart grid. IEEE Internet of Things Journal, 2019, 6(6):9722-9737, IEEE. |
[80] |
Ikram Ali, Alzubair Hassan, Fagen Li. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 2019,16: 45-61, Elsevier. |
[79] |
Emmanuel Ahene, Chunhua Jin, Fagen Li. Certificateless deniably authenticated encryption and its application to e-voting system. Telecommunication Systems, 2019,70 (3):417-434, Springer. |
[78] |
Emmanuel Ahene, Junfeng Dai, Hao Feng, Fagen Li. A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid. Telecommunication Systems, 2019, 70(4): 491-510, Springer. |
[77] |
Erneste Uwizeye, Jiye Wang, Zhihua Cheng, Fagen Li. Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Annals of Telecommunications, 2019, 74(7-8): 435-449, Springer |
[76] |
Jiaojiao Hong, Bo Liu, Qianyuan Sun, Fagen Li. A combined public-key scheme in the case of attribute-based for wireless body area networks. Wireless Networks, 2019, 25(2):845-859, Springer. |
[75] |
Alzubair Hassan, Anyembe Andrew Omala, Mohamed Ali, Chunhua Jin, Fagen Li. Identity-based user authenticated key agreement protocol for multi-server environment with anonymity. Mobile Networks and Applications, 2019, 24(3): 890-902, Springer. |
[74] |
Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li. An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. Journal of Systems Architecture, 2019,98:165-172, Elsevier. |
[73] |
Ikram Ali, Mwitende Gervais, Emmanuel Ahene, Fagen Li. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 2019,99: 101636, Elsevier. |
[72] |
Mwitende Gervais, Liang Sun, Ke Wang, and Fagen Li. Certificateless authenticated key agreement for decentralized WBANs. Frontiers in Cyber Security (FCS 2019), CCIS 1105, pp. 268-290, 2019. |
[71] |
Emmanuel Ahene, Yuanfeng Guan, Zhiwei Zhang, Fagen Li. CLIBDA: A deniable authentication scheme for pervasive computing environment. Frontiers in Cyber Security (FCS 2019), CCIS 1105, pp. 67-83, 2019. |
2018年 |
|
[70]
|
Fagen Li, Yanan Han, Chunhua Jin. Cost-effective and anonymous access control for wireless body area networks. IEEE Systems Journal, 2018, 12(1):747-758, IEEE. |
[69] |
Fagen Li, Jiaojiao Hong, Anyembe Andrew Omala. Practical deniable authentication for pervasive computing environments. Wireless Networks, 2018, 24 (1): 139-149, Springer. |
[68] |
刘波,周雨阳,胡飞,李发根.适用于移动客户端--多服务器环境的用户认证与密钥协商协议.密码学报. 2018, 5 (2): 111-125. |
[67] |
Xiaoguang Liu, Chunhua Jin, Fagen Li. An improved two-layer authentication scheme for wireless body area networks. Journal of Medical Systems, 2018, 42:143, Springer. |
[66] |
Anyembe Andrew Omala, Angolo Shem Mbandu, Kamenyi Domenic Mutiria, Chunhua Jin, Fagen Li. Provably secure heterogeneous access control scheme for wireless body area network. Journal of Medical Systems, 2018, 42:108, Springer. |
[65] |
Yuyang Zhou, Zhaoqi Li, Fei Hu, Fagen Li. Identity-based combined public key schemes for signature, encryption and signcryption. Information Technology and Applied Mathematics, AISC 699, pp. 3-22, Springer-Verlag, 2018. |
[64] |
Anyembe Andrew Omala, Ikram Ali, Fagen Li. Heterogeneous signcryption with keyword search for wireless body area network Internet of Things. Security and Privacy, 1(5):e25, Wiley, 2018. |
[63] |
Alzubair Hassan,Nabeil Eltayieb,Rashad Elhabob,Fagen Li. An efficient certificateless user authentication and key exchange protocol for client-server environment. Journal of Ambient Intelligence and Humanized Computing, 2018,9 (6):1713-1727, Springer. |
[62] |
Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li. Fine-grained attribute-based encryption scheme supporting equality test. International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2018), LNCS 11337, pp.220-233, Springer-Verlag, 2018. |
2017年 |
|
[61]
|
Fagen Li, Jiaojiao Hong, Anyembe Andrew Omala. Efficient certificateless access control for industrial Internet of Things. Future Generation Computer Systems, 2017, 76: 285-292, Elsevier. |
[60]
|
Fagen Li, Bo Liu, Jiaojiao Hong. An efficient signcryption for data access control in cloud computing. Computing, 2017, 99 (5): 465-479, Springer. |
[59] |
Fagen Li, Yanan Han, Chunhua Jin. Certificateless online/offline signcryption for the Internet of things. Wireless Networks, 2017, 23 (1): 145-158, Springer. |
[58] |
Anyembe Andrew Omala,Kittur P. Kibiwott, Fagen Li. An efficient remote authentication scheme for wireless body area network, Journal of Medical Systems, 2017, 41 (2):25, Springer. |
[57] |
Alzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li. A Provably secure certificateless user authentication protocol for mobile client-server environment. Advances in Internetworking, Data & Web Technologies (EIDWT 2017), LNDECT 6, pp. 592-602, Springer-Verlag, 2017. |
2016年 |
|
[56] |
Fagen Li, Di Zhong, Tsuyoshi Takagi. Efficient deniably authenticated encryption and its application to e-mail. IEEE Transactions on Information Forensics and Security, 2016, 11 (11): 2477-2486, IEEE. |
[55] |
Fagen Li, Jiaojiao Hong. Efficient certificateless access control for wireless body area networks. IEEE Sensors Journal, 2016, 16 (13): 5389-5396, IEEE. |
[54] |
Fagen Li, Yanan Han, Chunhua Jin. Practical access control for sensor networks in the context of the Internet of things. Computer Communications, 2016, 89-90: 154-164, Elsevier. |
[53] |
Fagen Li, Yanan Han, Chunhua Jin. Practical signcryption for secure communication of wireless sensor networks. Wireless Personal Communications, 2016, 89 (4): 1391-1412, Springer. |
[52] |
Fagen Li, Zhaohui Zheng, Chunhua Jin. Secure and efficient data transmission in the Internet of things. Telecommunication Systems, 2016, 62 (1): 111-122, Springer. |
[51] |
Fagen Li, Zhaohui Zheng, Chunhua Jin. Identity-based deniable authenticated encryption and its application to e-mail system. Telecommunication Systems, 2016, 62 (4): 625-639, Springer. |
[50] |
Anyembe Andrew Omala, Niyifasha Robert, Fagen Li. A Provably-secure transmission scheme for wireless body area networks. Journal of Medical Systems, 2016, 40: 247, Springer. |
[49] |
韩亚楠,李发根.适用于智能电网的组合公钥密码体制研究.密码学报, 2016, 3(4): 340-351. |
2015年 |
|
[48] |
Weifeng Wu, Fagen Li. An Efficient identity-based deniable authenticated encryption scheme. KSII Transactions on Internet and Information Systems, 2015, 9(5): 1904-1919. |
2014年 |
|
[47] |
Fagen Li, Pan Xiong, Chunhua Jin. Identity-based deniable authentication for ad hoc networks. Computing, 2014, 96 (9): 843-853, Springer. |
2013年 |
|
[46] |
Fagen Li, Hui Zhang, Tsuyoshi Takagi. Efficient signcryption for heterogeneous systems. IEEE Systems Journal, 2013, 7 (3): 420-429, IEEE. |
[45] |
Fagen Li, Pan Xiong. Practical secure communication for integrating wireless sensor networks into the Internet of things. IEEE Sensors Journal, 2013, 13 (10): 3677-3684, IEEE. |
[44] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Certificateless hybrid signcryption. Mathematical and Computer Modelling, 2013, 57 (3-4): 324-343, Elsevier. |
[43] |
Fagen Li, Fahad Bin Muhaya, Muhammad Khurram Khan, Tsuyoshi Takagi. Lattice-based signcryption. Concurrency and Computation: Practice and Experience, 2013, 25 (14): 2112-2122, Wiley. |
[42] |
Fagen Li, Tsuyoshi Takagi. Secure identity-based signcryption in the standard model. Mathematical and Computer Modelling, 2013, 57 (11-12): 2685-2694, Elsevier. |
[41] |
Fagen Li, Tsuyoshi Takagi. Cryptanalysis and improvement of robust deniable authentication protocol. Wireless Personal Communications, 2013, 69 (4): 1391-1398, Springer. |
[40] |
Fagen Li, Mingwu Zhang, Tsuyoshi Takagi. Identity-based partially blind signature in the standard model for electronic cash. Mathematical and Computer Modelling, 2013, 58(1-2): 196-203, Elsevier. |
2012年 |
|
[39] |
Fagen Li, Muhammad Khurram Khan. A biometric identity-based signcryption scheme. Future Generation Computer Systems, 2012, 28 (1): 306-310, Elsevier. |
[38] |
Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi. Identity-based online/offline signcryption for low power devices. Journal of Network and Computer Applications, 2012, 35(1): 340-347, Elsevier. |
[37] |
Fagen Li, Mingwu Zhang, Tsuyoshi Takagi. Efficient signcryption in the standard model. Concurrency and Computation: Practice and Experience, 2012, 24 (17): 1977-1989, Wiley. |
[36] |
Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi. Further improvement of an identity-based signcryption scheme in the standard model. Computers and Electrical Engineering, 2012, 38 (2): 413-421, Elsevier. |
[35] |
Fagen Li, Di Zhong, Tsuyoshi Takagi. Practical identity-based signature for wireless sensor networks. IEEE Wireless Communications Letters, 2012, 1(6): 637-640, IEEE. |
2011年 |
|
[34] |
Fagen Li, Yongjian Liao, Zhiguang Qin. Analysis of an identity-based signcryption scheme in the standard model. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011, E94-A(1): 268-269. |
[33] |
Fagen Li, Muhammad Khurram Khan. A survey of identity-based signcryption. IETE Technical Review, 2011, 28(3): 265-272. |
[32] |
Fagen Li, Jiang Deng, Tsuyoshi Takagi. An Improved Authenticated Encryption Scheme. IEICE Transactions on Information and Systems, 2011, E94-D(11): 2171-2172. |
[31] |
Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi. Efficient Identity-Based Signcryption in the Standard Model. The Fifth International Conference on Provable Security (ProvSec 2011), LNCS 6980, pp.120-137, Springer-Verlag, 2011. |
2010年 |
|
[30] |
Fagen Li, Zhiguang Qin. Cryptanalysis of a Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem. IETE Technical Review, 2010, 27(3):266-269. (SCI) |
[29] |
李发根, SHIRASE Masaaki, TAKAGI Tsuyoshi. 对适用于移动通信的代理签名方案的安全性分析. 中国科学:信息科学, 2010, 40(6): 796-800. |
[28] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Cryptanalysis of efficient proxy signature schemes for mobile communication. SCIENCE
|
2009年 |
|
[27] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Certificateless hybrid signcryption. The 5th Information Security Practice and Experience Conference (ISPEC 2009), LNCS 5451, pp.112-123, Springer-Verlag, 2009. |
[26] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Efficient multi-PKG ID-based signcryption for ad hoc networks. 4th International Conference on Information Security and Cryptology (Inscrypt 2008), LNCS 5487, pp. 289-304, Springer-Verlag, 2009. |
[25] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Efficient signcryption key encapsulation without random oracles. 4th International Conference on Information Security and Cryptology (Inscrypt 2008), LNCS 5487, pp. 47-59, Springer-Verlag, 2009. |
[24] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Identity-based hybrid signcryption. Fourth International Conference on Availability, Reliability and Security (ARES 2009), pp. 534-539, IEEE Computer Society, Fukuoka, Japan, 2009. |
[23] |
Fagen Li, Hu Xiong, Yongjian Liao. A generic construction of identity-based signcryption. International Conference on Communications, Circuits and Systems (ICCCAS 2009), pp. 291-295, IEEE Press, San Jose,
|
[22] |
Fagen Li, Hu Xiong, Xuyun Nie. A new multi-receiver ID-based signcryption scheme for group communications. International Conference on Communications, Circuits and Systems (ICCCAS 2009), pp.296-300, IEEE Press, San Jose,
|
2008年 |
|
[21] |
Fagen Li, Xiangjun Xin, Yupu Hu. Identity-based broadcast signcryption, Computer Standards and Interfaces, 2008, 30(1-2):89-94. |
[20] |
Fagen Li, Xiangjun Xin, Yupu Hu. Efficient certificate-based signcryption scheme from bilinear pairings. International Journal of Computers and Applications, 2008, 30(2):129-133. |
[19] |
Fagen Li, Shijie Zhou, Rong Sun. Cryptanalysis of an identity based proxy multi-signature scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008, E91-A(7):1820-1823. |
[18] |
Fagen Li, Xiangjun Xin, Yupu Hu. ID-based threshold proxy signcryption scheme from bilinear pairings. International Journal of Security and Networks, 2008, 3(3):206-215. |
[17] |
Fagen Li, Chunxiang Xu, Shijie Zhou. Improvement of a proactive threshold signcryption scheme. International Journal of Computers and Applications, 2008, 30(4):345-347. |
[16] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. On the security of online/offline signatures and multisignatures from ACISP’06. The 7th International Conference on Cryptology and Network Security (CANS 2008), LNCS 5339, pp. 108-119, Springer-Verlag, 2008. |
[15] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, Key management using certificateless public key cryptography in ad hoc networks. IFIP International Conference on Network and Parallel Computing (NPC 2008), LNCS 5245, pp.116-126, Springer-Verlag, 2008. |
[14] |
Fagen Li, Yong Yu. An efficient and provably secure ID-based threshold signcryption scheme. International Conference on Communications, Circuits and Systems (ICCCAS 2008), pp.547-551, IEEE Press, Chengdu,
|
[13] |
Fagen Li, Hu Xiong, Yong Yu. An efficient ID-based ring signcryption scheme. International Conference on Communications, Circuits and Systems (ICCCAS 2008), pp.542-546, IEEE Press, Chengdu,
|
2007年 |
|
[12] |
Fagen Li, Yupu Hu. Security analysis of the pomykala-barabasz scheme. Fundamenta Informaticae, 2007, 80(4):453-462. |
[11] |
Fagen Li, Xiangjun Xin, Yupu Hu. A pairing-based signcryption scheme using self-certified public keys, International Journal of Computers and Applications, 2007, 29(3): 278-282. |
[10] |
Fagen Li, Xiangjun Xin, Yupu Hu. Key management in ad hoc networks using self-certified publey system, International Journal of Mobile Communication, 2007, 5(1):94-106. |
[9] |
Fagen Li, Yupu Hu, Chuanrong Zhang. An identity-based signcryption scheme for multi-domain ad hoc networks. 5th International Conference on Applied Cryptography and Network Security (ACNS 2007), LNCS 4521, pp. 373-384, Springer-Verlag, 2007. |
[8] |
Fagen Li, Yupu Hu, Shuanggen Liu. ID-based (t, n) threshold proxy signcryption for multi-agent systems. International Conference on Computational Intelligence and Security (CIS 2006), Revised Selected Papers, LNAI 4456, pp.406-416, Springer-Verlag, 2007. |
[7] |
Fagen Li, Chunxiang Xu. An improved identity-based KCDSA signcryption scheme. The First International Symposium on Data, Privacy, & E-Commerce (ISDPE 2007), pp. 230-232, IEEE Computer Society, 2007. |
2006年 |
|
[6] |
李发根,胡予濮,李刚.一个高效的基于身份的签密方案.计算机学报,2006, 29(9):1641-1647. |
[5] |
Fagen Li, Xiangjun Xin, Yupu Hu. ID-based signcryption scheme with (t, n) shared unsigncryption. International Journal of Network Security, 2006, 3(2):155-159. |
[4] |
Fagen Li, Yupu Hu, Jie Chen. Efficient ID-based signcryption scheme for multiple recipients. The 5th International Workshop for Applied PKC (IWAP 2006), Dalian,
|
[3] |
Fagen Li, Yupu Hu, Shuanggen Liu. Security analysis of two ID-based threshold proxy signature schemes. The 5th International Workshop for Applied PKC (IWAP 2006), Dalian,
|
[2] |
Fagen Li, Yupu Hu, Jie Chen. Efficient and provably secure signcryption scheme from bilinear pairings. The 9th
|
2005年 |
|
[1] |
Fagen Li, Juntao Gao, Yupu Hu. ID-based threshold unsigncryption scheme from pairings. SKLOIS Conference on Information Security and Cryptology (CISC 2005), LNCS 3822, pp. 242-253, Springer-Verlag, 2005. |