Author of the publication

A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN.

, , , and . NCM, page 2062-2068. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multicasting Secret Images using a Knapsack-like Cipher System.. CAINE, page 67-72. ISCA, (2004)ID-based authentication for mobile conference call., , , and . SEC, volume 54 of IFIP Conference Proceedings, page 49-58. Chapman & Hall, (1996)Dynamic embedding strategy of VQ-based information hiding approach., , , and . J. Vis. Commun. Image Represent., (2019)A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing., and . DEXA, volume 1677 of Lecture Notes in Computer Science, page 372-381. Springer, (1999)Reversible SMVQ Image Hiding Using Adaptive Search Order Coding., , , , and . DICTA, page 1-6. IEEE, (2016)Secure Protocol for Identity-based Provable Data Possession in Cloud Storage., , , , and . ICCCS, page 327-331. IEEE, (2019)Tor Browser Forensics in Exploring Invisible Evidence., , , and . SMC, page 3909-3914. IEEE, (2018)Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks., , and . J. Commun., 3 (1): 20-26 (2008)A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN., , , and . NCM, page 2062-2068. IEEE Computer Society, (2009)Reversible steganography based on side match and hit pattern for VQ-compressed images., , , and . Inf. Sci., 181 (11): 2218-2230 (2011)