Author of the publication

Quantum Cryptography Trends: A Milestone in Information Security.

, , , and . HIS, volume 420 of Advances in Intelligent Systems and Computing, page 25-39. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CryptoNET: Secure federation protocol and authorization policies for SMI., , and . CRiSIS, page 19-25. IEEE, (2009)Blockchain and edge computing-based architecture for participatory smart city applications., , and . Concurr. Comput. Pract. Exp., (2020)Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol., , , and . KES, volume 22 of Procedia Computer Science, page 680-688. Elsevier, (2013)Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA., , , and . SECRYPT, page 387-392. SciTePress, (2014)CryptoNET : Generic Security Framework for Cloud Computing Environments.. Royal Institute of Technology, Stockholm, Sweden, (2011)base-search.net (ftkthstockholm:oai:DiVA.org:kth-32786).Secure Layered Architecture for Session Initiation Protocol Based on SIPSSO: Formally Proved by Scyther., and . ITNG, page 185-190. IEEE Computer Society, (2015)VeidBlock: Verifiable Identity using Blockchain and Ledger in a Software Defined Network., and . UCC (Companion"), page 173-179. ACM, (2017)Secure Virtual Machine Migration (SV2M) in Cloud Federation., , , and . SECRYPT, page 344-349. SciTePress, (2014)A model and design of a security provider for Java applications., , and . ICITST, page 1-7. IEEE, (2009)A solution to Perceptual Aliasing through Probabilistic Fuzzy Logic and SIFT., , , , , and . AIM, page 1393-1398. IEEE, (2013)