Author of the publication

On the (In)Security of Two Buyer-Seller Watermarking Protocols.

, and . SECRYPT, page 253-260. INSTICC Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delay, throughput and packet absorption rate analysis of heterogeneous WMN., , , , and . ICWCA, page 1-6. IEEE, (2012)Preserving Privacy of Agents in Reinforcement Learning for Distributed Cognitive Radio Networks., and . ICONIP (1), volume 9947 of Lecture Notes in Computer Science, page 555-562. (2016)Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution., , , , , , and . SIN, page 170. ACM, (2014)Analysis of a secure cooperative channel sensing protocol for cognitive radio networks., , and . SIN, page 41-46. ACM, (2012)Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud., , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1307-1319 (2021)Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage., , , , , , , , and . HCIS, (2015)Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage., , , , , , and . Algorithms, 10 (2): 52 (2017)Application of reinforcement learning for security enhancement in cognitive radio networks., , , , and . Appl. Soft Comput., (2015)Verifiable Structured Encryption., and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 137-156. Springer, (2012)An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption., and . IWDW, volume 5450 of Lecture Notes in Computer Science, page 433-447. Springer, (2008)