Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Payment technologies for e-commerce.. Springer, (2003)A new look at DCT-type transforms., and . IEEE Trans. Acoust. Speech Signal Process., 37 (12): 1899-1908 (1989)Watermarking protocol of secure verification., , , and . J. Electronic Imaging, 16 (4): 043002 (2007)Fair E-Commerce Protocols without a Third Party., , and . ISCC, page 324-327. IEEE Computer Society, (2006)QoS-Oriented Hybrid Admission Control in IEEE 802.11 WLAN., , , and . AINA, page 484-487. IEEE Computer Society, (2005)A Secure Steganography Scheme Based on (N, t) Threshold., and . AINA (2), page 536-539. IEEE Computer Society, (2004)The Security Analyses of RosettaNet in Grid., , , and . ICPADS (2), page 540-544. IEEE Computer Society, (2005)A family of FH sequences based on 3DES block cipher for FHMA communications., , , , and . ICC, page 311-315. IEEE, (2004)Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks., , , and . IEEE Trans. Vehicular Technology, 58 (7): 3508-3517 (2009)Efficient ID-based Signature Without Trusted PKG., , , and . IACR Cryptology ePrint Archive, (2007)