Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents., , , and . Wireless Personal Communications, 56 (1): 73-83 (2011)High speed implementation of symmetric block cipher on GPU., , , and . ISPACS, page 102-107. IEEE, (2014)Security and Privacy Preservation in Human-Involved Networks., , and . iNetSeC, volume 309 of IFIP Advances in Information and Communication Technology, page 139-148. Springer, (2009)Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09., , , and . CANS, volume 7092 of Lecture Notes in Computer Science, page 172-184. Springer, (2011)Intrinsic two-dimensional local structures for micro-expression recognition., , , , and . ICASSP, page 1851-1855. IEEE, (2016)On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR., , and . PSIVT (1), volume 7087 of Lecture Notes in Computer Science, page 257-266. Springer, (2011)On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences., , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 245-265. Springer, (2007)Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords., and . ACNS, volume 3989 of Lecture Notes in Computer Science, page 226-238. (2006)Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks., , and . AFRICACRYPT, volume 5580 of Lecture Notes in Computer Science, page 60-76. Springer, (2009)A Cryptanalytic View of the NSA's Skipjack Block Cipher Design., and . ISA, volume 5576 of Lecture Notes in Computer Science, page 368-381. Springer, (2009)