Author of the publication

Secure Undeniable Threshold Proxy Signature Scheme

. International Journal of Advanced Computer Science and Applications(IJACSA), (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Efficient RSA Digital Multisignature and Blind Multisignature Schemes., and . Computational Intelligence, page 359-362. IASTED/ACTA Press, (2005)An Efficient RSA Public Key Encryption Scheme., , , and . ITNG, page 127-130. IEEE Computer Society, (2008)Efficient multiple-collision trapdoor hash family., and . Secur. Commun. Networks, 5 (6): 681-688 (2012)Secure Undeniable Threshold Proxy Signature Scheme. International Journal of Advanced Computer Science and Applications(IJACSA), (2014)A New Factoring Algorithm., and . Security and Management, page 341-347. CSREA Press, (2003)Secure E-Test Scheme.. Int. J. Emerg. Technol. Learn., (2007)Efficient Password Scheme Without Trusted Server., , and . Int. J. Aviat. Technol. Eng. Manag., 1 (1): 52-57 (2011)A New Digital Signature Scheme Based on Integer Factoring and Discrete Logarithm Problem., , and . Int. J. Comput. Their Appl., 17 (2): 108-115 (2010)Criticism of Knapsack Encryption Scheme. CoRR, (2010)Fast Fraction-Integer Method for Computing Multiplicative Inverse, , and . CoRR, (2009)