Author of the publication

Analysis of the information theoretically secret key agreement by public discussion.

, , , , , and . Secur. Commun. Networks, 8 (15): 2507-2523 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Biometric Authentication Scheme Based on Chaotic Map., and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 643-653. Springer, (2018)Analysis of the information theoretically secret key agreement by public discussion., , , , , and . Secur. Commun. Networks, 8 (15): 2507-2523 (2015)Fast Scalar Multiplications on the Curve v2 = up - au - b over the Finite Field of Characteristic p., , , and . Fundam. Informaticae, 129 (4): 395-412 (2014)An Improved Model on the Vague Sets-Based DPoS's Voting Phase in Blockchain., , , , and . IEEE Trans. Netw. Sci. Eng., 10 (6): 4010-4019 (November 2023)A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability., , , and . Secur. Commun. Networks, (2021)Helpful-stressful cycle? Psychological links between type of mobile phone user and stress., , , and . Behav. Inf. Technol., 35 (1): 75-86 (2016)Offline/Online lattice-based ciphertext policy attribute-based encryption., , , , , and . J. Syst. Archit., (2022)Models for estimating Leaf Area Index of different crops using hyperspectral data., , , , , , , , and . IGARSS, page 3283-3286. IEEE, (2010)An Improved Model of PBFT with Anonymity and Proxy Based on Linkable Ring Signature., , and . ICA3PP (5), volume 14491 of Lecture Notes in Computer Science, page 491-502. Springer, (2023)CoChain: High Concurrency Blockchain Sharding via Consensus on Consensus., , , and . INFOCOM, page 1-10. IEEE, (2023)