Author of the publication

Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.

, , , and . ISC, volume 3225 of Lecture Notes in Computer Science, page 330-341. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

t-Out-of-n String/Bit Oblivious Transfers Revisited., , , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 410-421. Springer, (2005)An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet., , and . Informatica (Slovenia), (2002)DRM system for multiple cascaded business operators., , , and . ICME, page 1651-1654. IEEE Computer Society, (2010)Anonymity and Security Support for Persistent Enterprise Conversation., , and . EDOC, page 471-476. IEEE Computer Society, (2006)A Commutative Encrypted Protocol for the Privacy Protection of Watermarks in Digital Contents., , and . HICSS, IEEE Computer Society, (2004)Anonymity and Security in Continuous Double Auctions for Internet Retails Market., and . HICSS, IEEE Computer Society, (2004)An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids., , and . AINA, page 194-197. IEEE Computer Society, (2003)Fair Electronic Cash Based on Double Signatur., , and . J. Comput. Sci. Technol., 17 (6): 830-835 (2002)Secure Double Auction Protocols with Full Privacy Protection., , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 215-229. Springer, (2003)Supporting the legal identities of contracting agents with an agent authorization platform., , , , and . ICEC, volume 113 of ACM International Conference Proceeding Series, page 721-728. ACM, (2005)