Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An effective multi-layered defense framework against spam., , , and . Inf. Sec. Techn. Report, 12 (3): 179-185 (2007)Efficient Linkable and/or Threshold Ring Signature Without Random Oracles., , , , and . Comput. J., 56 (4): 407-421 (2013)Protecting the internet of things., , , and . Security and Communication Networks, 7 (12): 2637-2638 (2014)Further analysis of the Internet key exchange protocol.. Computer Communications, 23 (17): 1606-1612 (2000)Non-repudiation protocols for multiple entities., , and . Computer Communications, 27 (16): 1608-1616 (2004)An optimistic fair exchange protocol with active intermediaries., , , and . Int. J. Inf. Sec., 12 (4): 299-318 (2013)How to achieve non-repudiation of origin with privacy protection in cloud computing., , , and . J. Comput. Syst. Sci., 79 (8): 1200-1213 (2013)A New Approach for Anonymous Password Authentication., , , and . ACSAC, page 199-208. IEEE Computer Society, (2009)Improved Double Auction Protocol based on a Hybrid Trust Model., , and . JCP, 1 (2): 33-41 (2006)Preface., and . Journal of Computer Security, 14 (5): 389-390 (2006)