Author of the publication

A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets.

, , , and . NSysS, page 1-5. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparison between RSA and ElGamal based untraceable blind signature schemes., , , and . NSysS, page 1-4. IEEE, (2016)An Untraceable Voting Scheme Based on Pairs of Signatures., , , , , and . Int. J. Netw. Secur., 20 (4): 774-787 (2018)Location Data Anonymization Retaining Data Mining Utilization., , , and . ADMA (2), volume 13726 of Lecture Notes in Computer Science, page 407-418. Springer, (2022)Privacy-preserving Top-k Dominating Queries in Distributed Multi-party Databases., , , and . IEEE BigData, page 5794-5803. IEEE, (2019)A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets., , , and . NSysS, page 1-5. IEEE, (2015)An Anonymity Retaining Framework for Multi-party Skyline Queries Based on Unique Tags., , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3183-3195 (July 2024)A secure and efficient data transmission technique using quantum key distribution., , , and . NSysS (2), page 1-5. IEEE, (2017)A DNA cryptographic technique based on dynamic DNA encoding and asymmetric cryptosystem., , , and . NSysS (2), page 1-8. IEEE, (2017)Multi-factor Based Stock Price Prediction Using Hybrid Neural Networks with Attention Mechanism., , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 961-966. IEEE, (2019)An Incoercible E-Voting Scheme Based on Revised Simplified Verifiable Re-encryption Mix-nets., , , and . CoRR, (2015)