Author of the publication

Protecting the Privacy of Users in e-Commerce Environment.

, and . CCCT (1), page 63-67. The International Institute of Informatics and Systemics (IIIS), (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prediction-Based Reversible Data Hiding Using Energy Deviation Strategy., , , , and . J. Inf. Hiding Multim. Signal Process., 9 (2): 293-302 (2018)Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification., , , and . J. Inf. Hiding Multim. Signal Process., (2015)An Active Attack on Protocols for Server-Aided RSA Signature Computation.. Inf. Process. Lett., 65 (2): 71-73 (1998)Protecting the Privacy of Users in e-Commerce Environment., and . CCCT (1), page 63-67. The International Institute of Informatics and Systemics (IIIS), (2004)Extended Relation Metadata for SCORM-based Learning Content Management Systems., , , and . J. Educ. Technol. Soc., 13 (1): 220-235 (2010)Accelerating DSA Signature Generation.. Cryptologia, 39 (2): 121-125 (2015)A Secure YS-Like User Authentication Scheme., , and . Informatica, 18 (1): 27-36 (2007)Secure Authentication Scheme for Supporting Healthcare in Wireless Sensor Networks., , , , and . AINA Workshops, page 502-507. IEEE Computer Society, (2012)Password Authentication Without Using a Password Table.. Inf. Process. Lett., 55 (5): 247-250 (1995)Computing the modular inverses is as simple as computing the GCDs., , and . Finite Fields Their Appl., 14 (1): 65-75 (2008)