Author of the publication

An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce.

, , , , and . ICA3PP, volume 5574 of Lecture Notes in Computer Science, page 214-225. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient undeniable group-oriented signature scheme., , and . Appl. Math. Comput., 165 (1): 95-102 (2005)Secure Dynamic Access Control Scheme of PHR in Cloud Computing., , , , , and . J. Medical Systems, 36 (6): 4005-4020 (2012)A Password-Based User Authentication Scheme for the Integrated EPR Information System., , , and . J. Medical Syst., 36 (2): 631-638 (2012)Efficient proxy multisignature schemes based on the elliptic curve cryptosystem., , and . Comput. Secur., 22 (6): 527-534 (2003)Apply Lagrange Interpolation Based Access Control Mechanism in Personal Health Record Medical System., , , , and . BWCCA, volume 97 of Lecture Notes in Networks and Systems, page 327-337. Springer, (2019)Unconditionally Secure Cryptosystem Based on Quantum Cryptography., , , and . JCIS, Atlantis Press, (2006)A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery., , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 502-512. Springer, (2006)Hierarchical Time-Bound Key Management for Mobile Agents., , , , and . ICA3PP, volume 5574 of Lecture Notes in Computer Science, page 242-253. Springer, (2009)Secure PHR Access Control Scheme for Healthcare Application Clouds., , , , , , , and . ICPP, page 1067-1076. IEEE Computer Society, (2013)An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce., , , and . Expert Syst. Appl., 38 (8): 9900-9907 (2011)