Receiver-and sender-deniable functional encryptionAngelo De CaroVincenzo Iovinoet al.2018IET Information Security
SACK2: Effective SYN flood detection against skillful spoofsChanghua SunC. Huet al.2012IET Information Security
Generalised key delegation for hierarchical identity-based encryptionM. AbdallaE. Kiltzet al.2008IET Information Security
Mobile IP registration in certificateless public key infrastructureL. DangW. Kouet al.2007IET Information Security