Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificateless group inside signature., , and . ISADS, page 194-200. IEEE Computer Society, (2005)Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery., , and . HCI (15), volume 4564 of Lecture Notes in Computer Science, page 124-133. Springer, (2007)Improved Group-Oriented Encryption for Group Communication., and . CSO (2), page 667-671. IEEE Computer Society, (2009)978-0-7695-3605-7.An ID-based group signature., , and . InfoSecu, page 229-230. ACM, (2004)Red Preserving Algorithm for Underwater Imaging., and . GRMSE (2), volume 699 of Communications in Computer and Information Science, page 110-116. Springer, (2016)Normalized Moment of Inertia-Based Detection Algorithm for Copy-Paste Image Tampering., , and . IJPRAI, 33 (6): 1954023:1-1954023:16 (2019)Adaptive Stretching Method for Underwater Image Color Correction., and . IJPRAI, 32 (2): 1854001:1-1854001:14 (2018)Fast Monte Carlo method to simulate atmospheric backscattering of wireless laser sensor network., , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 211-215. IEEE, (2020)Group-oriented Encryption Secure against Collude Attack., and . J. Convergence Inf. Technol., 3 (4): 47-53 (2008)A New Chameleon Multi-signature Based on Bilinear Pairing., and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 329-334. Springer, (2004)