Author of the publication

A Merging Method of Certification Authorities Without Using Cross-Certifications.

, and . AINA (2), page 174-177. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Intrusion Detection System at User Level with System-Call Interposing., and . ICETE (2), page 263-268. INSTICC Press, (2004)An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme., , and . WWW (Posters), (2003)A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository., and . IWAP, volume 128 of Frontiers in Artificial Intelligence and Applications, page 155-168. IOS Press, (2005)Differential Fault Analysis of Full LBlock., , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 135-150. Springer, (2012)Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack., and . INDOCRYPT, volume 1977 of Lecture Notes in Computer Science, page 178-190. Springer, (2000)How Intractable Is the Discrete Logarithm for a General Finite Group?, , and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 420-428. Springer, (1992)A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm., and . PQCrypto, volume 7071 of Lecture Notes in Computer Science, page 275-294. Springer, (2011)Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick., and . CHES, volume 2523 of Lecture Notes in Computer Science, page 564-578. Springer, (2002)Formal Verification for Access Control in Web Information Sharing System., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 80-89. Springer, (2009)Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party., , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 265-279. Springer, (2003)