Author of the publication

The Security Analyses of RosettaNet in Grid.

, , , and . ICPADS (2), page 540-544. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient ID-based Signature Without Trusted PKG., , , and . IACR Cryptology ePrint Archive, (2007)Active Page Generation via Customizing XML for Data Beans in E-Commerce Applications., , , , and . ISEC, volume 2040 of Lecture Notes in Computer Science, page 79-97. Springer, (2001)A family of FH sequences based on 3DES block cipher for FHMA communications., , , , and . ICC, page 311-315. IEEE, (2004)Performance Analysis of Secure Web Server Based on SSL., , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 249-261. Springer, (2000)An Improved Scheme for Unilateral Asymmetric Smart Card Authentication., , and . AINA, page 265-268. IEEE Computer Society, (2005)A Secure M-Commerce Model Based On Wireless Local Area Network., and . AINA (2), page 520-523. IEEE Computer Society, (2004)Editorial., and . Int. J. Digit. Libr., 3 (4): 277-278 (2002)Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (12): 3833-3836 (2008)An Efficient Anonymous Registration Scheme for Mobile IPv4., , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 758-766. Springer, (2006)A direct computation of DCT coefficients for a signal block taken from two adjacent blocks., and . IEEE Trans. Signal Process., 39 (7): 1692-1695 (1991)