Author of the publication

User-friendly random-grid-based visual secret sharing for general access structures.

, , and . Secur. Commun. Networks, 9 (10): 966-976 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ROSE: real one-stage effort to detect the fingerprint singular point based on multi-scale spatial attention., , , , , and . Signal Image Video Process., 16 (3): 669-676 (2022)Fingerprint Singular Point Detection Based on Multiple-Scale Orientation Entropy., , , , and . IEEE Signal Process. Lett., 18 (11): 679-682 (2011)MPKC-based threshold proxy signcryption scheme., , , and . Int. Arab J. Inf. Technol., 17 (2): 196-206 (2020)Palmprint recognition using a modified competitive code with distinctive extended neighbourhood., , , , , and . IET Comput. Vis., 12 (8): 1151-1162 (2018)Mutual Authentication and Ownership Transfer Scheme Conforming to EPC-C1G2 Standard., , , and . CIS, page 678-682. IEEE Computer Society, (2012)Improvement on WLAN Multicast Key Management Protocol., and . CIS (2), page 419-424. IEEE Computer Society, (2008)978-0-7695-3508-1.Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme., and . IET Inf. Secur., 8 (1): 8-11 (2014)Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel., , , and . IEEE Access, (2019)Verification of Trusted Network Access Protocols in the Strand Space Model., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (3): 665-668 (2012)A Trusted Network Access Protocol for WLAN Mesh Networks., , , and . IEICE Trans. Inf. Syst., 96-D (12): 2865-2869 (2013)