Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fair-Exchange E-Payment Protocol For Digital Products With Customer Unlinkability., , , and . KSII Trans. Internet Inf. Syst., 6 (11): 2956-2979 (2012)A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks., , and . IEICE Trans. Inf. Syst., 92-D (5): 777-786 (2009)Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks., , and . J. Inf. Sci. Eng., 29 (2): 249-265 (2013)ElGamal-like digital signature and multisignature schemes using self-certified public keys., , and . J. Syst. Softw., 50 (2): 99-105 (2000)Ownership transfer protocol for RFID objects using lightweight computing operators., , and . ICITST, page 484-489. IEEE, (2011)Robust Certificateless Signature Scheme without Bilinear Pairings., , , and . ICITCS, page 1-4. IEEE Computer Society, (2013)ID-Based Structured Mulitsignature Schemes., , and . Network Security, volume 206 of IFIP Conference Proceedings, page 45-59. Kluwer, (2001)Improvement of modified authenticated key agreement protocol., , , and . Appl. Math. Comput., 142 (2-3): 305-308 (2003)Group-oriented authentication mechanism with key exchange., and . Comput. Commun., 21 (5): 485-497 (1998)New Secure Broadcasting Scheme Realizing Information Granularity., , , and . J. Inf. Sci. Eng., 26 (4): 1509-1523 (2010)