Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks., and . Comput. J., 57 (10): 1557-1569 (2014)A new mobile payment scheme for roaming services., , and . Electron. Commer. Res. Appl., 6 (2): 184-191 (2007)An Improved Threshold Scheme Based on Modular ARithmetic., and . J. Inf. Sci. Eng., 15 (5): 691-699 (1999)Privacy protection on Vehicular Ad hoc NETworks., , and . Int. J. Ad Hoc Ubiquitous Comput., 7 (4): 261-271 (2011)Key agreement in ad hoc networks., and . Int. J. Comput. Sci. Eng., 2 (1/2): 37-45 (2006)The optimal split method of large integer multiplication for smart low-end devices on P2P ubiquitous networks., and . Peer-to-Peer Netw. Appl., 7 (4): 655-664 (2014)Watermark in Color Image., , and . CW, page 225-229. IEEE Computer Society, (2002)Secure Data Collection Scheme for Wireless Sensor Networks., and . AINA Workshops, page 553-558. IEEE Computer Society, (2017)A Method for Sending Confidential Messages to a Group without Trusted Parties., and . ISPA, volume 2745 of Lecture Notes in Computer Science, page 375-381. Springer, (2003)Lossy Compression Tolerant Steganography., , , and . Human.Society@Internet, volume 2105 of Lecture Notes in Computer Science, page 427-435. Springer, (2001)