Author of the publication

A New Group Signature Scheme Based on RSA Assumption.

, , and . Inf. Technol. Control., 42 (1): 61-66 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authorized file-sharing system on P2P networks., , and . IWCMC, page 1289-1293. ACM, (2010)A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks., , and . IWCMC, page 1198-1202. ACM, (2010)A secure and efficient authentication protocol for anonymous channel in wireless communications., , , and . Appl. Math. Comput., 169 (2): 1431-1439 (2005)A secure routing protocol with node selfishness resistance in MANETs., , and . Int. J. Mob. Commun., 10 (1): 103-118 (2012)Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards., , and . IEEE Trans. Consumer Electronics, 50 (2): 578-579 (2004)Authentication and Billing Protocols for the Integration of WLAN and 3G Networks., , and . Wireless Personal Communications, 29 (3-4): 351-366 (2004)A Study of Public Key Encryption with Keyword Search., , and . Int. J. Netw. Secur., 15 (2): 71-79 (2013)A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing., , , and . Int. J. Netw. Secur., 18 (4): 650-666 (2016)Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards., and . Int. J. Netw. Secur., 3 (3): 283-285 (2006)3G and WLAN Interworking Security: Current Status and Key., , and . Int. J. Netw. Secur., 2 (1): 1-13 (2006)