Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Verifiable and Traceable Secondhand Digital Media Market Protocol., and . TIIS, 5 (8): 1472-1491 (2011)A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images., , and . IEEE Trans. Circuits Syst. Video Techn., 19 (6): 900-905 (2009)Efficient illumination compensation techniques for text images., , and . Digital Signal Processing, 22 (5): 726-733 (2012)Low-Complexity Bit-Parallel Systolic Multipliers over GF(2m)., , , and . SMC, page 1160-1165. IEEE, (2006)Combined circuit architecture for computing normal basis and montgomery multiplications over GF(2m)., , and . Mobility Conference, page 46. ACM, (2008)Scalable and Systolic Montgomery Multipliers over GF(2m)., , and . IEICE Transactions, 91-A (7): 1763-1771 (2008)Development of a Novel Bidirectional Control Telecare System over a Wireless Sensor Network and the Internet., , , and . APSCC, page 907-913. IEEE Computer Society, (2008)Authenticated Encryption Schemes with Message Linkage for Threshold Signatures., , , , and . AINA, page 261-264. IEEE Computer Society, (2005)Yet Another Attack on a QR-based Password Authentication System., and . AINA (2), page 170-173. IEEE Computer Society, (2004)Supervising Secret-Key Agreements in a Level-Based Hierarchy., , and . AINA (1), page 309-314. IEEE Computer Society, (2004)