Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery., , and . HCI (15), volume 4564 of Lecture Notes in Computer Science, page 124-133. Springer, (2007)Improved Group-Oriented Encryption for Group Communication., and . CSO (2), page 667-671. IEEE Computer Society, (2009)978-0-7695-3605-7.An ID-based group signature., , and . InfoSecu, page 229-230. ACM, (2004)Certificateless group inside signature., , and . ISADS, page 194-200. IEEE Computer Society, (2005)Normalized Moment of Inertia-Based Detection Algorithm for Copy-Paste Image Tampering., , and . IJPRAI, 33 (6): 1954023:1-1954023:16 (2019)Adaptive Stretching Method for Underwater Image Color Correction., and . IJPRAI, 32 (2): 1854001:1-1854001:14 (2018)Red Preserving Algorithm for Underwater Imaging., and . GRMSE (2), volume 699 of Communications in Computer and Information Science, page 110-116. Springer, (2016)Fast Monte Carlo method to simulate atmospheric backscattering of wireless laser sensor network., , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 211-215. IEEE, (2020)A New Chameleon Multi-signature Based on Bilinear Pairing., and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 329-334. Springer, (2004)Group-oriented Encryption Secure against Collude Attack., and . J. Convergence Inf. Technol., 3 (4): 47-53 (2008)