Author of the publication

Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.

, , , , , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 369-382. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-User Private Keyword Search for Cloud Computing., , and . CloudCom, page 264-271. IEEE Computer Society, (2011)A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises., , and . SEC, volume 181 of IFIP, page 95-112. Springer, (2005)A Generic Scheme for Secure Data Sharing in Cloud., and . ICPP Workshops, page 145-153. IEEE Computer Society, (2011)Forensic-by-Design Framework for Cyber-Physical Cloud Systems., , , and . IEEE Cloud Computing, 3 (1): 50-59 (2016)Human-Driven Edge Computing and Communication: Part 1., , , , , and . IEEE Communications Magazine, 55 (11): 70-71 (2017)Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication., , , and . IACR Cryptology ePrint Archive, (2013)Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing., , and . INTRUST, volume 6802 of Lecture Notes in Computer Science, page 189-199. Springer, (2010)Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity., , , , , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 369-382. Springer, (2004)Dynamic Workflow Adjustment with Security Constraints., , , , and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 211-226. Springer, (2014)Towards User-Oriented RBAC Model., , , , and . DBSec, volume 7964 of Lecture Notes in Computer Science, page 81-96. Springer, (2013)