Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient ID-based Digital Signature with Message Recovery Based on Pairing., , , and . IACR Cryptology ePrint Archive, (2006)An Immunity-Based Anomaly Detection System with Sensor Agents., and . Sensors, 9 (11): 9175-9195 (2009)A k-out-of-n Ring Signature with Flexible Participation for Signers., , , and . IACR Cryptology ePrint Archive, (2018)An Accessible CAPTCHA System for People with Visual Disability - Generation of Human/Computer Distinguish Test with Documents on the Net., , , and . HCI (7), volume 8516 of Lecture Notes in Computer Science, page 119-130. Springer, (2014)Towards an Immunity-Based System for Detecting Masqueraders., , and . KES, volume 2774 of Lecture Notes in Computer Science, page 488-495. Springer, (2003)Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people., , , , and . SMC, page 3946-3951. IEEE, (2014)A Restricted Undeniable Designated Verifier Signature., , , and . APSCC, page 1375-1380. IEEE Computer Society, (2008)An Improved Signcryption Scheme and Its Variation., , and . ITNG, page 772-778. IEEE Computer Society, (2007)Efficient Short Signatures from Pairing., , and . ITNG, page 417-422. IEEE Computer Society, (2009)Prevention of DoS Attacks on Use-After-Free Vulnerabilities in Mosquitto.. KES, volume 207 of Procedia Computer Science, page 1763-1772. Elsevier, (2022)