Author of the publication

The Secure Transaction Protocol in NFC Card Emulation Mode.

, , , and . I. J. Network Security, 17 (4): 431-438 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization., and . IIH-MSP, page 1367-1370. IEEE Computer Society, (2008)New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency., , and . J. Comput. Sci. Technol., 23 (2): 253-264 (2008)Security enhancement for anonymous secure e-voting over a network., , and . Computer Standards & Interfaces, 25 (2): 131-139 (2003)A simple micro-payment scheme., , and . Journal of Systems and Software, 55 (3): 221-229 (2001)The Secure Transaction Protocol in NFC Card Emulation Mode., , , and . I. J. Network Security, 17 (4): 431-438 (2015)Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures., , and . Informatica, Lith. Acad. Sci., 11 (1): 15-19 (2000)Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach., and . Informatica, Lith. Acad. Sci., 16 (1): 37-44 (2005)A new steganographic method for color and grayscale image hiding., , and . Computer Vision and Image Understanding, 107 (3): 183-194 (2007)A neural network system for authenticating remote users in multi-server architecture.. Int. J. Communication Systems, 21 (4): 435-445 (2008)A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies., , , and . AINA (2), page 376-379. IEEE Computer Society, (2004)