Author of the publication

Digital Image Anti-counterfeiting Technology.

, , , , and . BWCCA, volume 97 of Lecture Notes in Networks and Systems, page 670-677. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a fair proxy raffle protocol on the Internet., , and . Comput. Stand. Interfaces, 27 (4): 415-422 (2005)RFID system for public train transportation., and . Secur. Commun. Networks, 5 (6): 557-571 (2012)An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards., and . Secur. Commun. Networks, 7 (12): 2527-2541 (2014)Design of a VANET privacy and non-repudiation accident reporting system., and . Secur. Commun. Networks, 9 (18): 5187-5202 (2016)A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps., , , , and . Soft Comput., 22 (8): 2495-2506 (2018)Securing Information Exchange in VANETs by Using Pairing-Based Cryptography., , , , and . Int. J. Found. Comput. Sci., 28 (6): 781-798 (2017)A secure payment system for multimedia on demand on mobile VANET clouds., , , and . Secur. Commun. Networks, 9 (17): 4378-4390 (2016)Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET., , , and . Inf. Technol. Control., 42 (4): 369-379 (2013)A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services., , , and . Inf. Technol. Control., 45 (3): 289-299 (2016)The design of a secure anonymous Internet voting system., , and . Comput. Secur., 23 (4): 330-337 (2004)