Author of the publication

An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX.

, , , and . APSCC, page 199-204. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Public Key Encryption with Equality Test., , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 550-557. Springer, (2014)Cryptanalysis of a public-key cryptosystem based on generalized inverses of matrices.. IEEE Communications Letters, 5 (2): 61-63 (2001)A Gen2-Based RFID Authentication Protocol for Security and Privacy., and . IEEE Trans. Mob. Comput., 8 (8): 1052-1062 (2009)On Private-Key Cryptosystems Based on Product Codes., and . ACISP, volume 1438 of Lecture Notes in Computer Science, page 68-79. Springer, (1998)Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack., , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 116-128. Springer, (2007)DepenDNS: Dependable Mechanism against DNS Cache Poisoning., , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 174-188. Springer, (2009)Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits., , , , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 49-63. Springer, (2008)Secure broadcasting in large networks., and . Comput. Commun., 21 (3): 279-283 (1998)Data embedding in image-media using weight-function on modulo operations., , , and . ACM Trans. Embed. Comput. Syst., 12 (2): 21:1-21:12 (2013)On the Security of Chien's Ultralightweight RFID Authentication Protocol., , and . IEEE Trans. Dependable Secur. Comput., 8 (2): 315-317 (2011)