Author of the publication

Authenticated Group Key Agreement for Multicast.

, and . CANS, volume 4301 of Lecture Notes in Computer Science, page 55-72. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal XOR based (2, n)-Visual Cryptography Schemes., and . IACR Cryptology ePrint Archive, (2010)Improving the visual quality of size invariant visual cryptography scheme., , , and . J. Vis. Commun. Image Represent., 23 (2): 331-342 (2012)On distribution of Boolean functions with nonlinearity ≤2n-2.. Australas. J Comb., (1998)The alignment problem of visual cryptography schemes., , and . Des. Codes Cryptogr., 50 (2): 215-227 (2009)Multi-pixel Encryption Visual Cryptography., , and . Inscrypt, volume 7537 of Lecture Notes in Computer Science, page 86-92. Springer, (2011)Authenticated Group Key Agreement for Multicast., and . CANS, volume 4301 of Lecture Notes in Computer Science, page 55-72. Springer, (2006)Flexible Visual Cryptography Scheme and Its Application., , , and . Trans. Data Hiding Multim. Secur., (2014)Flexible Visual Cryptography Scheme without Distortion., , , and . IWDW, volume 7128 of Lecture Notes in Computer Science, page 211-227. Springer, (2011)Optimal XOR Based (2, n)-Visual Cryptography Schemes., and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 333-349. Springer, (2014)Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners., and . IET Inf. Secur., 5 (2): 121-128 (2011)