Author of the publication

Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation.

, , and . Signal Process., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation., , and . Signal Process., (2014)A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol., , , and . IIH-MSP, page 252-255. IEEE Computer Society, (2011)A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET., , and . Int. J. Netw. Secur., 17 (4): 395-404 (2015)IU-TransCert: A Blockchain-Based System for Academic Credentials with Auditability., , , and . SoICT, page 746-753. ACM, (2023)Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability., , and . AsiaJCIS, page 38-43. IEEE Computer Society, (2012)A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks., and . IEEE Trans. Wirel. Commun., 15 (1): 357-366 (2016)A Distributed Controller Approach Using P2P Protocol for Software Defined Networks., , , and . ACOMP, page 65-70. IEEE Computer Society, (2018)Sharing Secured Data on Peer-to-Peer Applications Using Attribute-Based Encryption., , , , and . ICCCI, volume 12496 of Lecture Notes in Computer Science, page 619-630. Springer, (2020)A provably secure smart card-based authenticated group key exchange protocol., and . Secur. Commun. Networks, 8 (8): 1602-1607 (2015)Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication., , and . Wireless Personal Communications, 71 (1): 425-437 (2013)