Author of the publication

Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality.

, , , , and . Symmetry, 16 (2): 147 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image resizing using fuzzy inferences., , , and . IET Image Processing, 13 (12): 2058-2066 (2019)An on-line electronic check system with mutual authentication., , and . Comput. Electr. Eng., 35 (5): 757-763 (2009)Enhanced authentication scheme with anonymity for roaming service in global mobility networks., , and . Comput. Commun., 32 (4): 611-618 (2009)Efficient authentication protocols of GSM., , and . Comput. Commun., 28 (8): 921-928 (2005)An on-line secret sharing scheme for multi-secrets., and . Comput. Commun., 21 (13): 1170-1176 (1998)Data hiding based on the similarity between neighboring pixels with reversibility., , and . Digit. Signal Process., 20 (4): 1116-1128 (2010)An efficient proxy raffle protocol with anonymity-preserving., and . Comput. Stand. Interfaces, 31 (4): 772-778 (2009)An ID-based multisignature scheme without reblocking and predetermined signing order., , and . Comput. Stand. Interfaces, 27 (4): 407-413 (2005)Sharing visual multi-secrets using circle shares., and . Comput. Stand. Interfaces, 28 (1): 123-135 (2005)A new edge detection approach based on image context analysis., and . Image Vis. Comput., 24 (10): 1090-1102 (2006)