Author of the publication

A Trustable Reputation Scheme Based on Private Relationships.

, , , , and . ASONAM, page 19-24. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new approach to feature-based copyright protection of images., , and . ITRE, page 233-237. IEEE, (2005)A Secure and Flexible Data Aggregation Framework for Smart Grid., , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 681-690. Springer, (2013)A communication-efficient private matching scheme in Client-Server model., , , and . Inf. Sci., (2014)Further cryptanalysis of the McEliece public-key cryptosystem.. IEEE Communications Letters, 4 (1): 18-19 (2000)Secure E-mail protocols providing perfect forward secrecy., , and . IEEE Communications Letters, 9 (1): 58-60 (2005)An Approach Towards Rebalanced RSA-CRT with Short Public Exponent., and . IACR Cryptology ePrint Archive, (2005)A Novel ID-based Electronic Cash System from Pairings., , , and . IACR Cryptology ePrint Archive, (2009)API Monitoring System for Defeating Worms and Exploits in MS-Windows System., , and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 159-170. Springer, (2006)On the decomposition constructions for perfect secret sharing schemes., and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 50-60. Springer, (1997)Secret Sharing in Graph-Based Prohibited Structures., and . INFOCOM, page 718-724. IEEE Computer Society, (1997)