Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a CIL Connector to Spin., and . International Journal of Software Engineering and Knowledge Engineering, 18 (1): 65-91 (2008)New Semantic Model for Authentication Protocols in ASMs., and . J. Comput. Sci. Technol., 19 (4): 555-563 (2004)On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack., and . IEICE Transactions, 97-A (11): 2267-2271 (2014)Frequency Domain Analysis of Lossy and Non-Uniform Twisted Wire Pair., , , and . IEEE Access, (2019)Two Efficient Tag-Based Encryption Schemes on Lattices., , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 118-131. Springer, (2017)Attribute-based multi-function verifiable computation., , , and . Future Generation Comp. Syst., (2018)Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system., , , and . Security and Communication Networks, 9 (16): 3309-3313 (2016)CPM Signals for Satellite Navigation in the S and C Bands., , and . Sensors, 15 (6): 13184-13200 (2015)Fast and Sensitive Ellipsometry-Based Biosensing., , , , , , and . Sensors, 18 (1): 15 (2018)A randomized RSA-based partially blind signature scheme for electronic cash., , and . Computers & Security, 24 (1): 44-49 (2005)