Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress., , , and . Comput. Hum. Behav., (2014)A Comparative Study on Snow Cover Monitoring of Different Spatial Resolution Remote Sensing Images., , , , , and . IGARSS (2), page 567-570. IEEE, (2009)LRS_PKI: A novel blockchain-based PKI framework using linkable ring signatures., , and . Comput. Networks, (December 2023)A Multi-server Authentication Scheme Based on Fuzzy Extractor., , and . ICA3PP (1), volume 14487 of Lecture Notes in Computer Science, page 488-500. Springer, (2023)Secure Two-party Computation Approach for NTRUEncrypt., , , and . IACR Cryptol. ePrint Arch., (2022)A Novel Fingerprint-Based Biometric Encryption., , and . 3PGCIC, page 146-150. IEEE Computer Society, (2014)Helpful-stressful cycle? Psychological links between type of mobile phone user and stress., , , and . Behav. Inf. Technol., 35 (1): 75-86 (2016)Analysis of the information theoretically secret key agreement by public discussion., , , , , and . Secur. Commun. Networks, 8 (15): 2507-2523 (2015)Fast Scalar Multiplications on the Curve v2 = up - au - b over the Finite Field of Characteristic p., , , and . Fundam. Informaticae, 129 (4): 395-412 (2014)An Improved Model on the Vague Sets-Based DPoS's Voting Phase in Blockchain., , , , and . IEEE Trans. Netw. Sci. Eng., 10 (6): 4010-4019 (November 2023)