Author of the publication

An image-based key agreement protocol using the morphing technique.

, , , and . Multimedia Tools Appl., 74 (9): 3207-3229 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks., and . IEEE Access, (2019)Linearly shift knapsack public-key cryptosystem., , , and . IEEE J. Sel. Areas Commun., 7 (4): 534-539 (1989)ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution., and . IEEE J. Sel. Areas Commun., 11 (5): 757-760 (1993)Comments on 'fair (t, n) threshold secret sharing scheme'.. IET Inf. Secur., 8 (6): 303-304 (2014)Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)., , and . Secur. Commun. Networks, (2019)Simulatable and secure certificate-based threshold signature without pairings., , and . Secur. Commun. Networks, 7 (11): 2094-2103 (2014)A Highly Reliable Arbiter PUF With Improved Uniqueness in FPGA Implementation Using Bit-Self-Test., , , , , and . IEEE Access, (2020)Efficient group Diffie-Hellman key agreement protocols., and . Comput. Electr. Eng., 40 (6): 1972-1980 (2014)PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones., , , , , , and . Comput. Networks, (January 2024)Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem., and . ACSAC, page 263-270. IEEE, (1989)