Author of the publication

A Model for Embedding and Authorizing Digital Signatures in Printed Documents.

, , , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 465-477. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model for Embedding and Authorizing Digital Signatures in Printed Documents., , , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 465-477. Springer, (2002)Testing the data framework for an AI algorithm in preparation for high data rate X-ray facilities., , , , , , , , , and 15 other author(s). XLOOP@SC, page 1-9. IEEE, (2022)Domain-Based Proxy for Efficient Location Tracking of Mobile Agents., and . NPC, volume 3222 of Lecture Notes in Computer Science, page 205-212. Springer, (2004)Practical Security Improvement of PKCS#5., , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 869-876. Springer, (2003)Implementation of the Broadcast Antenna with High Front-to-Back Ratio to Facilitate the Reuse of TV Channels., , , , and . IEICE Trans. Commun., 95-B (12): 3886-3889 (2012)