Author of the publication

Forward-secure ID based digital signature scheme with forward-secure private key generator.

, , and . Inf. Sci., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolution of Spamming Attacks on Facebook., , and . WISA, volume 10763 of Lecture Notes in Computer Science, page 101-111. Springer, (2017)A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones., , , , , , and . Pervasive Mob. Comput., (2019)Tidal flat reflectance model accommodating tidal conditions using Geostationary Ocean Color Imager (GOCI): Preliminary results., , , and . IGARSS, page 7629-7631. IEEE, (2012)Production adjusting method based on the predicted distribution of production and inventory using a dynamic Bayesian network., , , , and . Artif. Life Robotics, 14 (2): 138-143 (2009)A cooperative behavior learning control of multi-robot using trace information., , , and . Artif. Life Robotics, 13 (1): 144-147 (2008)Stochastic model of production and inventory control using dynamic bayesian network., , , and . Artif. Life Robotics, 13 (1): 148-154 (2008)A new location verification protocol and blockchain-based drone rental mechanism in smart farming., and . Comput. Electron. Agric., (November 2023)An Incremental Majority Voting Approach for Intrusion Detection System Based on Machine Learning., and . IEEE Access, (2024)Graphical passwords: Behind the attainment of goals., , , , , and . Secur. Priv., (2020)Parallel and Concurrent Security of the HB and HB+ Protocols., , and . J. Cryptol., 23 (3): 402-421 (2010)