Author of the publication

Multi fuzzy vault based on secret sharing for deadlock restoration.

, , , , and . Int. J. Inf. Technol. Manag., 11 (1/2): 50-60 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ROSE: real one-stage effort to detect the fingerprint singular point based on multi-scale spatial attention., , , , , and . Signal Image Video Process., 16 (3): 669-676 (2022)Fingerprint Singular Point Detection Based on Multiple-Scale Orientation Entropy., , , , and . IEEE Signal Process. Lett., 18 (11): 679-682 (2011)MPKC-based threshold proxy signcryption scheme., , , and . Int. Arab J. Inf. Technol., 17 (2): 196-206 (2020)Palmprint recognition using a modified competitive code with distinctive extended neighbourhood., , , , , and . IET Comput. Vis., 12 (8): 1151-1162 (2018)Improvement on WLAN Multicast Key Management Protocol., and . CIS (2), page 419-424. IEEE Computer Society, (2008)978-0-7695-3508-1.Mutual Authentication and Ownership Transfer Scheme Conforming to EPC-C1G2 Standard., , , and . CIS, page 678-682. IEEE Computer Society, (2012)Protected Face Templates Generation Based on Multiple Partial Walsh Transformations and Simhash., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel., , , and . IEEE Access, (2019)Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme., and . IET Inf. Secur., 8 (1): 8-11 (2014)Verification of Trusted Network Access Protocols in the Strand Space Model., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (3): 665-668 (2012)