Author of the publication

Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol.

, , , , and . Inf. Sci., 180 (23): 4672-4684 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks., , , and . IEEE Trans. Vehicular Technology, 58 (7): 3508-3517 (2009)A family of FH sequences based on 3DES block cipher for FHMA communications., , , , and . ICC, page 311-315. IEEE, (2004)Active Page Generation via Customizing XML for Data Beans in E-Commerce Applications., , , , and . ISEC, volume 2040 of Lecture Notes in Computer Science, page 79-97. Springer, (2001)IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks., , , and . Comput. Commun., 31 (4): 659-667 (2008)Efficient ID-based Signature Without Trusted PKG., , , and . IACR Cryptology ePrint Archive, (2007)Performance Analysis of Secure Web Server Based on SSL., , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 249-261. Springer, (2000)A Secure M-Commerce Model Based On Wireless Local Area Network., and . AINA (2), page 520-523. IEEE Computer Society, (2004)An Improved Scheme for Unilateral Asymmetric Smart Card Authentication., , and . AINA, page 265-268. IEEE Computer Society, (2005)End-to-end E-commerce Application Development Based on XML Tools., , , , , , , , , and . IEEE Data Eng. Bull., 23 (1): 29-36 (2000)Mobile ip registration in certificateless public key infrastructure., , , , , and . IET Inf. Secur., 1 (4): 167-173 (2007)