Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding., , , and . Future Gener. Comput. Syst., (2019)Efficient TPA-based auditing scheme for secure cloud storage., and . Clust. Comput., 24 (3): 1989-2000 (2021)SEE_ME: Software Engineering Education Methodology Exploration., , , and . TALE, page 49-53. IEEE, (2015)Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited., , , and . Appl. Math. Comput., (2020)Secure medical data management with privacy-preservation and authentication properties in smart healthcare system., , , , and . Comput. Networks, (2022)How to control a DC Motor using ZX., and . FSKD, page 2376-2380. IEEE, (2012)Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC., , , , , and . IEEE Access, (2019)On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model., , , and . Comput. J., 62 (8): 1232-1245 (2019)RKA Security for Identity-Based Signature Scheme., , , , and . IEEE Access, (2020)Comment on Ä Tag Encoding Scheme Against Pollution Attack to Linear Network Coding"., , , and . IEEE Trans. Parallel Distributed Syst., 31 (11): 2618-2619 (2020)