Author of the publication

An electronic voting protocol with deniable authentication for mobile ad hoc networks.

, , and . Comput. Commun., 31 (10): 2534-2540 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An electronic voting protocol with deniable authentication for mobile ad hoc networks., , and . Comput. Commun., 31 (10): 2534-2540 (2008)Content-Aware Fast Motion Estimation Algorithm., , , , and . J. Vis. Commun. Image Represent., 19 (4): 256-269 (2008)Error-Tolerant Pooling Designs with Inhibitors., and . J. Comput. Biol., 10 (2): 231-236 (2003)Random Pooling Designs Under Various Structures., and . J. Comb. Optim., 7 (4): 339-352 (2003)Social Distance Detection Using Wireless Signal in Social Networks., and . SocialSec, volume 1495 of Communications in Computer and Information Science, page 37-41. Springer, (2021)Automatic segmentation of corneal deposits from corneal stromal dystrophy images via deep learning., , , , , , , , , and 1 other author(s). Comput. Biol. Medicine, (2021)Alignment of Optical Maps., , , , , , and . RECOMB, volume 3500 of Lecture Notes in Computer Science, page 489-504. Springer, (2005)Topic Modeling for Noisy Short Texts with Multiple Relations., , , and . SEKE, page 610-609. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2018)Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications., , and . Int. J. Netw. Secur., 1 (2): 74-76 (2005)Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme., , and . Int. J. Netw. Secur., 12 (1): 58-60 (2011)