Author of the publication

Secure Group Communication with Multiplicative One-way Functions.

, , , and . ITCC (1), page 685-690. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates., , , , and . IEICE Trans. Commun., 90-B (11): 3259-3262 (2007)A practical approach of ID-based cryptosystem in ad hoc networks., , and . Wirel. Commun. Mob. Comput., 7 (7): 909-917 (2007)A new data hiding scheme for binary image authentication with small image distortion., , and . Inf. Sci., 179 (22): 3866-3884 (2009)Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains., , , and . Int. J. Netw. Secur., 2 (1): 34-40 (2006)A Survey of the Transmission-Power-Control Schemes in Wireless Body-Sensor Networks., , , , , and . KSII Trans. Internet Inf. Syst., 12 (4): 1854-1868 (2018)Anomaly VAE-Transformer: A Deep Learning Approach for Anomaly Detection in Decentralized Finance., , and . IEEE Access, (2023)Analysis of Olympus DAO: a popular DeFi model., , and . ICACT, page 262-266. IEEE, (2023)An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids., , , and . Inf. Sci., 178 (14): 2968-2982 (2008)An attribute aggregation architecture with trust-based evaluation for access control., , and . NOMS, page 1011-1014. IEEE, (2008)A New Proxy Signature Scheme Providing Self-delegation., , , and . ICISC, volume 4296 of Lecture Notes in Computer Science, page 328-342. Springer, (2006)