Author of the publication

Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme.

, , and . EEE, page 569-572. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Password-Based User Authentication Scheme for the Integrated EPR Information System., , , and . J. Medical Syst., 36 (2): 631-638 (2012)Efficient proxy multisignature schemes based on the elliptic curve cryptosystem., , and . Comput. Secur., 22 (6): 527-534 (2003)Unconditionally Secure Cryptosystem Based on Quantum Cryptography., , , and . JCIS, Atlantis Press, (2006)A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery., , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 502-512. Springer, (2006)Hierarchical Time-Bound Key Management for Mobile Agents., , , , and . ICA3PP, volume 5574 of Lecture Notes in Computer Science, page 242-253. Springer, (2009)Secure PHR Access Control Scheme for Healthcare Application Clouds., , , , , , , and . ICPP, page 1067-1076. IEEE Computer Society, (2013)A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy., , and . COMPSAC, page 396-397. IEEE Computer Society, (2004)The Implementation of IoT-based Smart Laboratory Management System., , , , , , and . ICEA, page 1:1-1:3. ACM, (2020)Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent., , , and . AINA Workshops, page 650-655. IEEE Computer Society, (2008)An Agent-Based Auction Protocol on Mobile Devices., , , , and . J. Appl. Math., (2014)