Author of the publication

Erratum to: "Digital signature algorithm for securing digital identities": Information Processing Letters 82 (2002) 247-252.

. Inf. Process. Lett., 88 (4): 201-202 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email., , , , and . USENIX Security Symposium, page 613-630. USENIX Association, (2020)Authentication and Key Agreement Via Memorable Passwords.. NDSS, The Internet Society, (2001)An Energy-Efficient Framework for Wireless Sensor Networks with Multiple Gateways., , , , and . UIC, volume 4611 of Lecture Notes in Computer Science, page 632-640. Springer, (2007)TA-MAC: Task Aware MAC Protocol for Wireless Sensor Networks., , , and . VTC Spring, page 294-298. IEEE, (2006)Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface, , , , and . CoRR, (2011)On the Impact of Deployment Errors in Location-Based Key Predistribution Protocols for Wireless Sensor Networks., , and . IEEE Access, (2024)Adaptive local route optimization in hierarchical mobile IPv6 networks., , and . WCNC, page 1421-1426. IEEE, (2005)An approximate analysis of handoff traffic in mobile cellular networks., , , and . WCNC, page 480-483. IEEE, (2000)New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography., , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 335-351. Springer, (2005)A Model for Embedding and Authorizing Digital Signatures in Printed Documents., , , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 465-477. Springer, (2002)