Author of the publication

Security-Preserving Asymmetric Protocol Encapsulation.

, and . ICISC, volume 4817 of Lecture Notes in Computer Science, page 346-366. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents., , , and . Wireless Personal Communications, 56 (1): 73-83 (2011)High speed implementation of symmetric block cipher on GPU., , , and . ISPACS, page 102-107. IEEE, (2014)Cryptanalysis of a certificateless identification scheme., , , and . Secur. Commun. Networks, 8 (2): 122-125 (2015)SearchaStore: fast and secure searchable cloud services., , , and . Clust. Comput., 21 (2): 1189-1202 (2018)On Integral Distinguishers of Rijndael Family of Ciphers., , and . Cryptologia, 36 (2): 104-118 (2012)Multi-layer authentication scheme for HEVC video based on embedded statistics., , , and . J. Vis. Commun. Image Represent., (2016)On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR., , and . PSIVT (1), volume 7087 of Lecture Notes in Computer Science, page 257-266. Springer, (2011)Security and Privacy Preservation in Human-Involved Networks., , and . iNetSeC, volume 309 of IFIP Advances in Information and Communication Technology, page 139-148. Springer, (2009)Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks., , and . AFRICACRYPT, volume 5580 of Lecture Notes in Computer Science, page 60-76. Springer, (2009)A Cryptanalytic View of the NSA's Skipjack Block Cipher Design., and . ISA, volume 5576 of Lecture Notes in Computer Science, page 368-381. Springer, (2009)