Author of the publication

Cryptanalysis of the Improved User Efficient Blind Signatures.

, and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 42-46. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adding timestamps to the secure electronic auction protocol., , and . Data Knowl. Eng., 40 (2): 155-162 (2002)Flexible RFID location system based on artificial neural networks for medical care facilities., , , and . SIGBED Review, 6 (2): 12 (2009)The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain., , and . Des. Codes Cryptogr., 36 (1): 53-67 (2005)A novel key management scheme for dynamic multicast communications., , and . Int. J. Commun. Syst., 22 (1): 53-66 (2009)A user authentication system using back-propagation network., , and . Neural Comput. Appl., 14 (3): 243-249 (2005)Novel full-search schemes for speeding up image coding using vector quantization., and . Real Time Imaging, 10 (2): 95-102 (2004)Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery., , and . Informatica, 28 (2): 375-386 (2017)An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks., , and . IJDSN, (2015)Flexible Hierarchical Key Assignment Scheme with Time-Based Assured Deletion for Cloud Storage., , and . ICS, volume 1013 of Communications in Computer and Information Science, page 599-607. Springer, (2018)An Access Control System with Time-constraint Using Support Vector Machines., , and . Int. J. Netw. Secur., 2 (2): 150-159 (2006)