Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hard-Timeliness Blockchain-Based Contract Signing Protocol., and . Comput., 12 (12): 246 (November 2023)Optimistic protocol for certified electronic mail with verifiable TTP., , , and . Comput. Stand. Interfaces, (2018)A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons., , and . WISTP, volume 10741 of Lecture Notes in Computer Science, page 165-176. Springer, (2017)A Lightweight Delegated Privileges Revocation Scheme Based on Coding., and . IWAP, volume 128 of Frontiers in Artificial Intelligence and Applications, page 207-221. IOS Press, (2005)Deployment and performance evaluation of mobile multicoupon solutions., , , and . Int. J. Inf. Sec., 18 (1): 101-124 (2019)A Solution for Secure Multi-Party Certified Electronic Mail Using Blockchain., and . IEEE Access, (2020)Anonymity and Transferability for an Electronic Bank Check Scheme., , , and . TrustCom, page 427-435. IEEE Computer Society, (2012)An optimistic certified e-mail protocol for the current Internet e-mail architecture., , , and . CNS, page 382-390. IEEE, (2014)Design of an Enhanced PKI for Ubiquitous Networks., , , , , , and . DEXA Workshops, page 262-266. IEEE Computer Society, (2005)Pervasive authentication and authorization infrastructures for mobile users., , , , , , , and . Comput. Secur., 29 (4): 501-514 (2010)