Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacks on and Countermeasures for Two RFID Protocols., , , and . Wireless Personal Communications, 96 (4): 5825-5848 (2017)A randomized RSA-based partially blind signature scheme for electronic cash., , and . Comput. Secur., 24 (1): 44-49 (2005)Smart-Phone Based Server-Aided Computation., , and . ISCSCT (1), page 295-298. IEEE Computer Society, (2008)ID-Based Ring Authenticated Encryption., , and . AINA, page 591-596. IEEE Computer Society, (2005)Improvement of an Authenticated Key Agreement Protocol., , and . APWeb/WAIM Workshops, volume 4537 of Lecture Notes in Computer Science, page 593-601. Springer, (2007)Using clustering coefficient to construct weighted networks for supervised link prediction., , and . Soc. Netw. Anal. Min., 4 (1): 215 (2014)Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes., and . Int. J. Netw. Secur., 4 (3): 355-360 (2007)Traceability Attack Algorithm on EOHLCAP RFID Authentication Protocol., , , , and . J. Comput., 9 (4): 938-946 (2014)Multistage Filtering for Collusion Detection in P2P Network., , and . DASC, page 911-916. IEEE Computer Society, (2011)Cryptanalysis of SPA Protocol., and . SITIS, page 1049-1052. IEEE Computer Society, (2007)