Author of the publication

An Improved Threshold Scheme Based on Modular ARithmetic.

, and . J. Inf. Sci. Eng., 15 (5): 691-699 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new mobile payment scheme for roaming services., , and . Electron. Commer. Res. Appl., 6 (2): 184-191 (2007)Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks., and . Comput. J., 57 (10): 1557-1569 (2014)An Improved Threshold Scheme Based on Modular ARithmetic., and . J. Inf. Sci. Eng., 15 (5): 691-699 (1999)Privacy protection on Vehicular Ad hoc NETworks., , and . Int. J. Ad Hoc Ubiquitous Comput., 7 (4): 261-271 (2011)Key agreement in ad hoc networks., and . Int. J. Comput. Sci. Eng., 2 (1/2): 37-45 (2006)The optimal split method of large integer multiplication for smart low-end devices on P2P ubiquitous networks., and . Peer-to-Peer Netw. Appl., 7 (4): 655-664 (2014)Secure Data Collection Scheme for Wireless Sensor Networks., and . AINA Workshops, page 553-558. IEEE Computer Society, (2017)Watermark in Color Image., , and . CW, page 225-229. IEEE Computer Society, (2002)Fast Firmware Implementation of RSA-Like Security Protocol for Mobile Devices., , and . Wireless Personal Communications, 42 (2): 213-223 (2007)Lossy Compression Tolerant Steganography., , , and . Human.Society@Internet, volume 2105 of Lecture Notes in Computer Science, page 427-435. Springer, (2001)