Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New concepts for multiple stack systems: Born and reborn., , and . J. Syst. Softw., 27 (1): 45-54 (1994)Improvement of Tseng et al.'s authenticated encryption scheme.. Appl. Math. Comput., 165 (1): 1-4 (2005)Security of Hsu-Wu's authenticated encryption scheme with (t, n) shared verification., and . Appl. Math. Comput., 167 (1): 281-285 (2005)Security of Tzeng-Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems., and . Appl. Math. Comput., 168 (1): 717-721 (2005)Security Flaws of Off-Line Micro Payment Scheme with Dual Signatures.. EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 905-909. Springer, (2013)Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers., and . Informatica, 14 (2): 205-212 (2003)Universal Forgery on Shen et al.'s Linkable and Convertible ID-based Ring Signature Scheme.. ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 2201-2204. IOS Press, (2014)A Detector Using Variant Stacked Denoising Autoencoders with Logistic Regression for Malicious JavaScript with Obfuscations., and . ICS, volume 1723 of Communications in Computer and Information Science, page 374-386. Springer, (2022)Repairing ElGamal-like multi-signature schemes using self-certified public keys., and . Appl. Math. Comput., 156 (1): 73-83 (2004)Cryptanalysis of the Hwang-Shi Proxy Signature Scheme., , and . Fundam. Informaticae, 53 (2): 131-134 (2002)