Author of the publication

Visual cryptography schemes with optimal pixel expansion.

, , and . Theor. Comput. Sci., 369 (1-3): 169-182 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of public-key cryptosystems based on Chebyshev polynomials., , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 52-I (7): 1382-1393 (2005)On the protection of consumer genomic data in the Internet of Living Things., , , , , and . Comput. Secur., (2018)An internet role-game for the laboratory of network security course., and . ITiCSE, page 240-244. ACM, (2008)Reducing Costs in HSM-Based Data Centers., , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 3-14. (2017)An Optimal Algorithm for the Construction of Optimal Prefix Codes with Given Fringe., and . Data Compression Conference, page 297-306. IEEE Computer Society, (1991)Non-Interactive Zero-Knowledge: A Low-Randomness Characterization of NP., , and . ICALP, volume 1644 of Lecture Notes in Computer Science, page 271-280. Springer, (1999)On Monotone Formula Closure of SZK, , , and . FOCS, page 454-465. IEEE Computer Society, (1994)Do You Trust Your Phone?, , and . EC-Web, volume 5692 of Lecture Notes in Computer Science, page 50-61. Springer, (2009)Modified Original Smart Cards and Smart Card Clone Countermeasures., and . CIS, page 878-882. IEEE Computer Society, (2007)Device Tracking in Private Networks via NAPT Log Analysis., , , and . IMIS, page 603-608. IEEE Computer Society, (2012)