Author of the publication

Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes.

, , and . ISBAST, page 77-81. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-Time Password System with Infinite Nested Hash Chains., , and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 161-170. Springer, (2010)OTP-Based Two-Factor Authentication Using Mobile Phones., , and . ITNG, page 327-331. IEEE Computer Society, (2011)Mobile one-time passwords: two-factor authentication using mobile phones., , , , and . Security and Communication Networks, 5 (5): 508-516 (2012)The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices., , and . ITNG, page 196-200. IEEE Computer Society, (2014)Detecting counterfeit-money using RFID-enabled mobile devices., and . ICITST, page 74-79. IEEE, (2012)NMACA Approach Used to Build a Secure Message Authentication Code., , , and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 290-298. Springer, (2010)Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem., , , and . Sensors, 10 (9): 8683-8695 (2010)Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes., , and . ISBAST, page 77-81. IEEE Computer Society, (2012)Secure Instant Messaging Protocol for Centralized Communication Group., , , and . NTMS, page 1-4. IEEE, (2011)Cryptanalysis and Enhancement of a Password-Based Authentication Scheme., and . CloudCom, page 548-551. IEEE Computer Society, (2015)