Author of the publication

Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography.

, , , and . ICITST, page 449-452. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A robust multicast authentication scheme based on asymmetric key signature., , , , and . ICITST, page 449-458. IEEE, (2014)Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography., , , and . ICITST, page 449-452. IEEE, (2013)A location privacy system in mobile network using game theory., , and . CyberSA, page 1-5. IEEE, (2017)An Attribute-Based Signature using rivest shamir adleman scheme., , , and . ICITST, page 380-386. IEEE, (2014)Evaluation of information security risks using hybrid assessment model., , , , and . ICITST, page 387-395. IEEE, (2014)Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography., , , and . ICITST, page 449-452. IEEE, (2013)Edge detection methods in palm-print identification., and . ICITST, page 422-426. IEEE, (2013)Improving deception in honeynet: Through data manipulation., , , , and . ICITST, page 198-204. IEEE, (2014)Post-Quantum Crystography System for Secure Electronic Voting., , , , and . Open Comput. Sci., 9 (1): 292-298 (2019)Risk analysis in cyber situation awareness using Bayesian approach., , , and . CyberSA, page 1-12. IEEE, (2015)