Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization., and . IIH-MSP, page 1367-1370. IEEE Computer Society, (2008)New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency., , and . J. Comput. Sci. Technol., 23 (2): 253-264 (2008)A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies., , , and . AINA (2), page 376-379. IEEE Computer Society, (2004)A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress., , and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 69. ACM, (2007)An improvement of delegated multisignature scheme with document decomposition., and . Operating Systems Review, 38 (4): 52-57 (2004)A neural network system for authenticating remote users in multi-server architecture.. Int. J. Communication Systems, 21 (4): 435-445 (2008)Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures., , and . Informatica, Lith. Acad. Sci., 11 (1): 15-19 (2000)Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach., and . Informatica, Lith. Acad. Sci., 16 (1): 37-44 (2005)A new steganographic method for color and grayscale image hiding., , and . Computer Vision and Image Understanding, 107 (3): 183-194 (2007)A simple micro-payment scheme., , and . Journal of Systems and Software, 55 (3): 221-229 (2001)