Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

t-Out-of-n String/Bit Oblivious Transfers Revisited., , , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 410-421. Springer, (2005)An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet., , and . Informatica (Slovenia), (2002)DRM system for multiple cascaded business operators., , , and . ICME, page 1651-1654. IEEE Computer Society, (2010)An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids., , and . AINA, page 194-197. IEEE Computer Society, (2003)A Commutative Encrypted Protocol for the Privacy Protection of Watermarks in Digital Contents., , and . HICSS, IEEE Computer Society, (2004)Anonymity and Security in Continuous Double Auctions for Internet Retails Market., and . HICSS, IEEE Computer Society, (2004)Anonymity and Security Support for Persistent Enterprise Conversation., , and . EDOC, page 471-476. IEEE Computer Society, (2006)Design of polyphase sequence sets with good correlation properties under spectral distortion via majorization-minimization framework., , , and . Digit. Signal Process., (2024)SAWT: A New System for Secure and Anonymous Web Transactions over the Internet., , and . J. Res. Pract. Inf. Technol., 34 (1): 34-46 (2002)A Secure and Fully Private Borda Voting Protocol with Universal Verifiability., and . COMPSAC, page 224-229. IEEE Computer Society, (2004)