Author of the publication

A Trustable Reputation Scheme Based on Private Relationships.

, , , , and . ASONAM, page 19-24. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of Beacon-Based Positioning., and . J. Inf. Sci. Eng., 36 (3): 643-658 (2020)An enhanced authentication scheme in mobile RFID system., and . Ad Hoc Networks, (2018)Micropayment schemes with ability to return changes., , , , and . iiWAS, page 356-363. ACM, (2009)An Efficient Privacy Authentication Scheme Based on Cloud Models for Medical Environment., , and . NBiS, page 628-633. IEEE Computer Society, (2015)Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety., , , and . J. Medical Systems, 38 (9): 66 (2014)Design and Implementation of a Multiple-Choice E-voting Scheme on Mobile System using Novel t -out-of- n Oblivious Signature., and . J. Inf. Sci. Eng., 34 (1): 135-154 (2018)Efficient Authentication Schemes for Handover in Mobile WiMAX., , , and . ISDA (3), page 235-240. IEEE Computer Society, (2008)Common Friends Discovery with Privacy and Authenticity., , and . IAS, page 337-340. IEEE Computer Society, (2009)A Mobile RFID-based Mutual Authentication Protocol using Elliptic Curve Cryptography for Security Patrolling Application., , , and . RFIDSec Asia, volume 8 of Cryptology and Information Security Series, page 63-71. IOS Press, (2012)A Trustable Reputation Scheme Based on Private Relationships., , , , and . ASONAM, page 19-24. IEEE Computer Society, (2009)