Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterization of an Ada Software Development., , , , and . Computer, 18 (9): 53-65 (1985)Design of a signal processing circuit for quartz crystal microbalance biosensors., , , , , and . ASICON, page 180-183. IEEE, (2011)A Strong RSA-based and Certificateless-based Signature Scheme., , and . Int. J. Netw. Secur., 18 (2): 201-208 (2016)An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem., , and . Int. J. Netw. Secur., 16 (1): 58-64 (2014)A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment., , and . Secur. Commun. Networks, 6 (8): 972-984 (2013)A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management., , and . J. Inf. Hiding Multim. Signal Process., 6 (1): 140-153 (2015)Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues., , , and . Int. J. Netw. Secur., 18 (1): 90-98 (2016)Robust off-line e-cash scheme with recoverability and anonymity revocation., , and . Secur. Commun. Networks, 9 (14): 2412-2421 (2016)An image-based key agreement protocol using the morphing technique., , , and . Multimedia Tools Appl., 74 (9): 3207-3229 (2015)Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve., , and . IIH-MSP, page 898-901. IEEE Computer Society, (2009)