From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Characterization of an Ada Software Development., , , , и . Computer, 18 (9): 53-65 (1985)Design of a signal processing circuit for quartz crystal microbalance biosensors., , , , , и . ASICON, стр. 180-183. IEEE, (2011)A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment., , и . Secur. Commun. Networks, 6 (8): 972-984 (2013)An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem., , и . Int. J. Netw. Secur., 16 (1): 58-64 (2014)A Strong RSA-based and Certificateless-based Signature Scheme., , и . Int. J. Netw. Secur., 18 (2): 201-208 (2016)Robust off-line e-cash scheme with recoverability and anonymity revocation., , и . Secur. Commun. Networks, 9 (14): 2412-2421 (2016)A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management., , и . J. Inf. Hiding Multim. Signal Process., 6 (1): 140-153 (2015)Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues., , , и . Int. J. Netw. Secur., 18 (1): 90-98 (2016)An image-based key agreement protocol using the morphing technique., , , и . Multimedia Tools Appl., 74 (9): 3207-3229 (2015)Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve., , и . IIH-MSP, стр. 898-901. IEEE Computer Society, (2009)