Author of the publication

Design of Secure Watermarking Scheme for Watermarking Protocol.

, , , , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 357-366. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A two-party privacy preserving set intersection protocol against malicious users in cloud computing., , , and . Comput. Stand. Interfaces, (2017)Design of Secure Watermarking Scheme for Watermarking Protocol., , , , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 357-366. Springer, (2007)Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol., , , , and . Inf. Sci., 180 (23): 4672-4684 (2010)A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid., , , and . KSII Trans. Internet Inf. Syst., 15 (2): 617-636 (2021)Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks., , , , , , and . Int. J. Distributed Sens. Networks, (2018)Efficient Mobile IP Registration in Certificateless Signature., , and . AINA Workshops, page 363-366. IEEE Computer Society, (2010)IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks., , , and . Comput. Commun., 31 (4): 659-667 (2008)An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks., , , and . KSII Trans. Internet Inf. Syst., 9 (10): 4250-4267 (2015)A Certificateless Noninteractive Key Exchange Protocol with Provable Security., , , and . Secur. Commun. Networks, (2020)An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement., , , and . SpaCCS, volume 10656 of Lecture Notes in Computer Science, page 56-69. Springer, (2017)