Author of the publication

Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party.

, , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 265-279. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3-Party Adversarial Cryptography., , and . EIDWT, volume 47 of Lecture Notes on Data Engineering and Communications Technologies, page 247-258. Springer, (2020)Securing Provenance of Distributed Processes in an Untrusted Environment., , and . IEICE Trans. Inf. Syst., 95-D (7): 1894-1907 (2012)Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 327-330 (2005)Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 257-262. IEEE, (2018)Evaluation of a Zero-Watermarking-Type Steganography., , , and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 613-624. Springer, (2014)Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network., , , and . J. Networks, 7 (1): 88-100 (2012)A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks., , , , and . Comput. Commun., 35 (17): 2125-2137 (2012)Design of Intrusion Detection System at User Level with System-Call Interposing., and . ICETE (2), page 263-268. INSTICC Press, (2004)A proposal for the privacy leakage verification tool for Android application developers., and . ICUIMC, page 54. ACM, (2013)Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it., , and . ISAAC, volume 1533 of Lecture Notes in Computer Science, page 59-68. Springer, (1998)