Author of the publication

Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment.

, , and . Future Generation Comp. Syst., 25 (3): 352-357 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PER Measurement of Vehicular Communication Systems with Adjacent Channel Interferences., , and . ICHIT (2), volume 310 of Communications in Computer and Information Science, page 46-52. Springer, (2012)Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment., , and . KES (3), volume 4253 of Lecture Notes in Computer Science, page 1042-1049. Springer, (2006)Scheme for the Information Sharing Between IDSs Using JXTA., , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 754-761. Springer, (2005)A Vulnerability Assessment Tool Based on OVAL in Linux System., , and . NPC, volume 3222 of Lecture Notes in Computer Science, page 653-660. Springer, (2004)A Design of Safety Multimedia Packet Transmission DB System Management Scheme., , , and . ICHIT (1), volume 7425 of Lecture Notes in Computer Science, page 591-597. Springer, (2012)A Study on the Improvement of Military Logistics System Using RFID., , , , and . ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 1098-1102. Springer, (2006)Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL., , and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 1056-1061. Springer, (2005)A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems., , and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 1060-1065. Springer, (2006)Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment., , and . Future Generation Comp. Syst., 25 (3): 352-357 (2009)Network Intrusion Protection System Using Rule-Based DB and RBAC Policy., , , and . NPC, volume 3222 of Lecture Notes in Computer Science, page 670-675. Springer, (2004)