ü Authenticated
Key agreement Protocol / China Communications /2010/SI ü The
Complexity of the Graph Access Structure on Six Participants / Designs, Codes
and Cryptography/2010/ ISI ü Couple
Fixed- Point Theorems for contractions in Partially Order Metric Spaces and
Applications/ ISI Mathematical
Problems in Engineering/2011/ ISI ü Couple
Fixed point Theorem for Generalized Fuzzy Meir-Keeler Contraction in Fuzzy
Metric Spaces/ Journal of Computational Analysis and Applications/2012/ ISI ü Threshold
Quantum Secret Sharing Between Multiparty and Multiparty Using
Greenberger-Horne-Zeilinger/ Quantum Information Processing/2012 ISI / ü A
novel and Efficient Multiparty Quantum Secret Sharing Scheme Using Entangled
States/ Science ChinaPhysics, Mechanics & Astronomy/2012/ ISI ü Comment
on Couple Fixed point Theorems for nonlinear Contractions in Partially Ordered
Metric Spaces (Lakshmikantham nad Ciric, Nonlinear Anal)/ Journal of
Computational Analysis and Applications/2012 ü Average
Complexities of Access Structure on Five Participants/ Advance in Mathematics
of Communications/2013 ISI ü Zero-knowledge
Identification Scheme Based on Weil Pairing/ Lobachevskii Journal of
Mathematics/2009 ü A
New Batch Identification Scheme/ Discrete Mathematics, Algorithms and
Applications/2009 ü Public
Key Identification Scheme Based on Quaternion Properties/ IMS Manthan ( The
Journal of MQT., Comp. Science & Journalism)2010 ü Identity-
Based Multiple Key Agreement Scheme/ KSII Transaction on Internet and
Information Systems/2011 ü A
New Type of Fixed Point Theorems In Fuzzy Metric Spaces/ Int. J. Nonlinear
Appl./2013 ü Perfect
Secret Sharing Schemes for Graph Access Structure on Six Participants/ Journal
of Mathematical Cryptology/2013 ü Reviewing
Multiple Secret Image Sharing Scheme Based on Matrix Multiplication / Int.Computer Technology & Applications/2013 ü Vulnerability
Analysis of Two Ultra lightweight Authentication Protocol/ The International
Arab Journal of Information Technology/ ü Improvement
of the Hash-Based RFID Mutual Authentication Protocol/ Wireless Personal
Communications/2013/ ISI ü Certificateless
Identification Protocols from Super Singular Elliptic Curve/ Security and
Communication Networks/2013/ |