Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A k-out-of-n Ring Signature with Flexible Participation for Signers., , , and . IACR Cryptology ePrint Archive, (2018)An Efficient ID-based Digital Signature with Message Recovery Based on Pairing., , , and . IACR Cryptology ePrint Archive, (2006)Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people., , , , and . SMC, page 3946-3951. IEEE, (2014)Sender Authenticated Key Agreements without Random Oracles., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (8): 1787-1794 (2009)An Immunity-Based Anomaly Detection System with Sensor Agents., and . Sensors, 9 (11): 9175-9195 (2009)An Accessible CAPTCHA System for People with Visual Disability - Generation of Human/Computer Distinguish Test with Documents on the Net., , , and . HCI (7), volume 8516 of Lecture Notes in Computer Science, page 119-130. Springer, (2014)Towards an Immunity-Based System for Detecting Masqueraders., , and . KES, volume 2774 of Lecture Notes in Computer Science, page 488-495. Springer, (2003)Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys., , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 198-203. Springer, (2005)Increasing the Diversity of Resilient Server Using Multiple Virtualization Engines., , , and . KES, volume 96 of Procedia Computer Science, page 1701-1709. Elsevier, (2016)Prevention of DoS Attacks on Use-After-Free Vulnerabilities in Mosquitto.. KES, volume 207 of Procedia Computer Science, page 1763-1772. Elsevier, (2022)