Author of the publication

A Proxy Signature Scheme Based on Coding Theory.

, and . ICGS3, volume 92 of Communications in Computer and Information Science, page 282-290. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PDF of the Maximum of Two Correlated Random Variables with Applications to Fading Channels., and . IST, page 514-521. IEEE, (2018)Optimum Hardware-Architecture for Modular Divider in GF(2 m ) with Chaos as Arbitrary Source Based on ECC., and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 245-252. Springer, (2011)An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication., and . Frontiers Inf. Technol. Electron. Eng., 22 (7): 1010-1019 (2021)A Proxy Signature Scheme Based on Coding Theory., and . ICGS3, volume 92 of Communications in Computer and Information Science, page 282-290. Springer, (2010)Cryptanalysis and enhancement of two low cost rfid authentication protocols, and . CoRR, (2012)A secure cryptosystem based on affine transformation., and . Secur. Commun. Networks, 4 (2): 207-215 (2011)A novel statistics for the NWDP: An appropriate fading model for 5G/6G mmWave communications., and . Trans. Emerg. Telecommun. Technol., (January 2024)Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes., and . ICGS3, volume 92 of Communications in Computer and Information Science, page 291-299. Springer, (2010)Interference alignment in two-hop multiple-input multiple-output interference channel under various CSI and antenna correlation., and . IET Commun., 14 (20): 3599-3606 (2020)Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags., and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 186-193. Springer, (2011)