Author of the publication

Identity-based deniable authentication protocol from pairings.

, , and . IMSA, page 112-114. IASTED/ACTA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A library recommender system based on a personal ontology model and collaborative filtering technique for English collections., , , and . Electron. Libr., 28 (3): 386-400 (2010)An Efficient Ensemble Sequence Classifier., , , and . J. Softw., 11 (2): 133-147 (2016)Two attacks on a user friendly remote authentication scheme with smart cards., and . ACM SIGOPS Oper. Syst. Rev., 39 (2): 94-96 (2005)An improved frequent pattern growth method for mining association rules., , and . Expert Syst. Appl., 38 (5): 5154-5161 (2011)CIS-X: A compacted indexing scheme for efficient query evaluation of XML documents., and . Inf. Sci., (2013)Reversible Data Hiding Based on Median Difference Histogram., , and . J. Inf. Sci. Eng., 27 (2): 577-593 (2011)Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining., , , and . Inf. Sci., (2013)An interpretable health behavioral intervention policy for mobile device users., , , , , , , and . IBM J. Res. Dev., 62 (1): 4:1-4:6 (2018)WLAN Location-Aware Application Based on Accumulated Orientation Strength Algorithm., , and . EuroSSC, volume 4272 of Lecture Notes in Computer Science, page 204-217. Springer, (2006)Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information., and . Inf. Sci., 178 (4): 1049-1068 (2008)