Author of the publication

Multi-pixel Encryption Visual Cryptography.

, , and . Inscrypt, volume 7537 of Lecture Notes in Computer Science, page 86-92. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible Visual Cryptography Scheme without Distortion., , , and . IWDW, volume 7128 of Lecture Notes in Computer Science, page 211-227. Springer, (2011)Optimal XOR Based (2, n)-Visual Cryptography Schemes., and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 333-349. Springer, (2014)Authenticated Group Key Agreement for Multicast., and . CANS, volume 4301 of Lecture Notes in Computer Science, page 55-72. Springer, (2006)Public key cryptosystems based on boolean permutations and their applications., and . Int. J. Comput. Math., 74 (2): 167-184 (2000)Multi-pixel Encryption Visual Cryptography., , and . Inscrypt, volume 7537 of Lecture Notes in Computer Science, page 86-92. Springer, (2011)Modified Chinese Remainder Theorem and Its Application to Proxy Signatures., and . ICPP Workshops, page 146-153. IEEE Computer Society, (1999)Boolean Functions and Their Applications in Cryptography, and . Advances in Computer Science and Technology Springer, (2016)A privacy-preserving group encryption scheme with identity exposure.. Frontiers Comput. Sci., 16 (5): 165823 (2022)On (k, n) Visual Cryptography Scheme with t Essential Parties., , , , and . ICITS, volume 8317 of Lecture Notes in Computer Science, page 56-68. Springer, (2013)Fair Exchange of Digital Signatures with Offline Trusted Third Party., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 466-470. Springer, (2001)