Author of the publication

Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem.

, , , , and . ISPAN, page 260-265. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Public Key Encryption with Equality Test., , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 550-557. Springer, (2014)A Trustable Reputation Scheme Based on Private Relationships., , , , and . ASONAM, page 19-24. IEEE Computer Society, (2009)An Approach for Reducing the Traffic within Cloud Environments Based on Customized Linux Kernel., and . CloudCom, page 227-230. IEEE Computer Society, (2017)On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme., , and . IEEE Trans. Dependable Secur. Comput., 6 (2): 159-160 (2009)Data embedding in image-media using weight-function on modulo operations., , , and . ACM Trans. Embed. Comput. Syst., 12 (2): 21:1-21:12 (2013)Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID., , , , , and . J. Inf. Hiding Multim. Signal Process., 5 (4): 642-648 (2014)Password-based user authentication and key distribution protocols for client-server applications., and . J. Syst. Softw., 72 (1): 97-103 (2004)On the Security of Chien's Ultralightweight RFID Authentication Protocol., , and . IEEE Trans. Dependable Secur. Comput., 8 (2): 315-317 (2011)Secure broadcasting in large networks., and . Comput. Commun., 21 (3): 279-283 (1998)A Gen2-Based RFID Authentication Protocol for Security and Privacy., and . IEEE Trans. Mob. Comput., 8 (8): 1052-1062 (2009)