Author of the publication

A Secure Scalar Product Protocol Against Malicious Adversaries.

, , and . J. Comput. Sci. Technol., 28 (1): 152-158 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Ultrasynchronization Checking Method With Trace-Driven Simulation for Fast and Accurate MPSoC Virtual Platform Simulation., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 32 (6): 928-939 (2013)A semi-formal min-cost buffer insertion technique considering multi-mode multi-corner timing constraints., , and . ASP-DAC, page 505-510. IEEE, (2012)Automatic abstraction refinement of TR for PDR., , and . ASP-DAC, page 121-126. IEEE, (2016)Large Primes in Stream Cipher Cryptography., , and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 194-205. Springer, (1990)A Novel OTA with Dual Bulk-driven Input Stage., , , and . ISCAS, page 2721-2724. IEEE, (2009)Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot., , and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 232-238. ACM, (2009)System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats., , and . KSII Trans. Internet Inf. Syst., 12 (2): 906-918 (2018)An analysis of ATPG and SAT algorithms for formal verification., , and . HLDVT, page 177-182. IEEE Computer Society, (2001)Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing., , , and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 196-203. Springer, (2011)Scalable exploration of functional dependency by interpolation and incremental SAT solving., , , and . ICCAD, page 227-233. IEEE Computer Society, (2007)