| Publication | Date of Publication | Type |
|---|
Password authenticated key exchange and protected password change protocols Symmetry | 2019-11-13 | Paper |
An ElGamal-like secure channel free public key encryption with keyword search scheme International Journal of Foundations of Computer Science | 2019-06-24 | Paper |
| The moderately hard DoS-resistant authentication protocol on client puzzles | 2018-05-17 | Paper |
A new proxy signature scheme for a specified group of verifiers Information Sciences | 2014-08-01 | Paper |
A simple key assignment for access control based on polynomial Arabian Journal for Science and Engineering | 2013-08-05 | Paper |
| Cryptanalysis on an improved version of ElGamal-like public-key encryption scheme for encrypting large messages | 2013-06-11 | Paper |
A batch verification for multiple proxy signature Parallel Processing Letters | 2012-12-12 | Paper |
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks Information Sciences | 2012-06-04 | Paper |
An efficient key assignment scheme for access control in a large leaf class hierarchy Information Sciences | 2011-03-28 | Paper |
A simple mobile communication billing system among charged parties Applied Mathematics and Computation | 2010-09-01 | Paper |
A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM International Journal of Foundations of Computer Science | 2009-06-23 | Paper |
An efficient multi-round anonymous auction protocol Journal of Discrete Mathematical Sciences and Cryptography | 2008-03-06 | Paper |
A new convertible authenticated encryption scheme with message linkages Computers and Electrical Engineering | 2007-03-02 | Paper |
A password authentication scheme over insecure networks Journal of Computer and System Sciences | 2006-06-30 | Paper |
| A secure strong-password authentication protocol | 2006-06-19 | Paper |
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures Applied Mathematics and Computation | 2006-04-28 | Paper |
A time-stamping protocol for digital watermarking Applied Mathematics and Computation | 2005-11-14 | Paper |
The general pay-word: A micro-payment scheme based on \(n\)-dimension one-way hash chain Designs, Codes and Cryptography | 2005-08-17 | Paper |
Simple authenticated key agreement and protected password change protocol Computers & Mathematics with Applications | 2005-08-05 | Paper |
Cryptanalysis of an authenticated encryption scheme using self-certified public keys Applied Mathematics and Computation | 2005-08-05 | Paper |
A new blind signature based on the discrete logarithm problem for untraceability Applied Mathematics and Computation | 2005-06-13 | Paper |
An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme Applied Mathematics and Computation | 2005-05-04 | Paper |
Improvement of signature scheme based on factoring and discrete logarithms Applied Mathematics and Computation | 2005-02-22 | Paper |
A new proxy signature scheme with revocation Applied Mathematics and Computation | 2005-02-22 | Paper |
| scientific article; zbMATH DE number 2113984 (Why is no real title available?) | 2004-11-05 | Paper |
| scientific article; zbMATH DE number 2112199 (Why is no real title available?) | 2004-10-28 | Paper |
| scientific article; zbMATH DE number 2112210 (Why is no real title available?) | 2004-10-28 | Paper |
A \((t,n)\) multi-secret sharing scheme Applied Mathematics and Computation | 2004-08-06 | Paper |
| scientific article; zbMATH DE number 2080695 (Why is no real title available?) | 2004-08-04 | Paper |
A new digital signature scheme based on factoring and discrete logarithms International Journal of Computer Mathematics | 2004-05-27 | Paper |
| scientific article; zbMATH DE number 2061980 (Why is no real title available?) | 2004-03-25 | Paper |
| scientific article; zbMATH DE number 1998329 (Why is no real title available?) | 2004-02-18 | Paper |
| scientific article; zbMATH DE number 2006822 (Why is no real title available?) | 2003-11-23 | Paper |
| scientific article; zbMATH DE number 2006800 (Why is no real title available?) | 2003-11-23 | Paper |
A simple remote user authentication scheme Mathematical and Computer Modelling | 2003-10-14 | Paper |
A new key authentication scheme based on discrete logarithms Applied Mathematics and Computation | 2003-09-09 | Paper |
| scientific article; zbMATH DE number 1977217 (Why is no real title available?) | 2003-09-08 | Paper |
| scientific article; zbMATH DE number 1876856 (Why is no real title available?) | 2003-05-14 | Paper |
A threshold decryption scheme without session keys Computers and Electrical Engineering | 2003-02-20 | Paper |
A new remote user authentication scheme for multi-server architecture Future Generation Computer Systems | 2003-01-21 | Paper |
Cryptanalysis of YCN key assignment scheme in a hierarchy Information Processing Letters | 2002-07-25 | Paper |
A digital watermarking scheme using human visual effects Informatica (Ljubljana) | 2002-04-15 | Paper |
Adding timestamps to the secure electronic auction protocol Data & Knowledge Engineering | 2002-03-03 | Paper |
An improvement of SPLICE/AS in WIDE against guessing attack Informatica (Vilnius) | 2002-02-28 | Paper |
| scientific article; zbMATH DE number 1877162 (Why is no real title available?) | 2002-01-01 | Paper |
Improved digital signature scheme based on factoring and discrete logarithms Journal of Discrete Mathematical Sciences and Cryptography | 2002-01-01 | Paper |
| scientific article; zbMATH DE number 1508174 (Why is no real title available?) | 2000-11-22 | Paper |
| scientific article; zbMATH DE number 1472274 (Why is no real title available?) | 2000-10-26 | Paper |
A virtual image cryptosystem based upon vector quantization IEEE Transactions on Image Processing | 2000-09-06 | Paper |
| scientific article; zbMATH DE number 1436132 (Why is no real title available?) | 2000-04-26 | Paper |
An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies<sup>∗</sup> International Journal of Computer Mathematics | 2000-04-09 | Paper |
An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy Computers & Mathematics with Applications | 2000-01-20 | Paper |
A new redundancy reducing cipher Informatica (Vilnius) | 2000-01-01 | Paper |
A remote password authentication scheme based on the digital signature method International Journal of Computer Mathematics | 1999-04-29 | Paper |
Multilevel secure database encryption with subkeys Data & Knowledge Engineering | 1998-07-23 | Paper |
A cryptographic key assignment scheme in a hierarchy for access control Mathematical and Computer Modelling | 1998-07-01 | Paper |