Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Directed User Authentication Scheme Based on Discrete Logarithm., and . Journal of Circuits, Systems, and Computers, 9 (5-6): 299-306 (1999)Sharing Multi-Secret Based on Circle Properties., and . CIS (1), page 340-344. IEEE Computer Society, (2008)Building General-Purpose Security Services on EMV Payment Cards., , and . SecureComm, volume 106 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 29-44. Springer, (2012)Very Small FPGA Processor for Multivariate Signatures., and . Comput. J., 59 (7): 1091-1101 (2016)A Privacy-Preserving Metro Passenger Flow Acquisition and Query System Based on Crowd-Sensing., , and . DSC, page 1-8. IEEE, (2018)A Homomorphic LWE-Based Verifiable Electronic Voting System., , and . DSC, page 1-8. IEEE, (2018)Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs., , , and . ISPEC, volume 8434 of Lecture Notes in Computer Science, page 187-201. Springer, (2014)Secure Distributed Deduplication Systems with Improved Reliability., , , , , , and . IEEE Trans. Computers, 64 (12): 3569-3579 (2015)Secure Encrypted Data With Authorized Deduplication in Cloud., , , , and . IEEE Access, (2019)SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key., , and . WISTP, volume 6633 of Lecture Notes in Computer Science, page 54-68. Springer, (2011)