Digital Library
Search Results: [ keyword: ICA ] (701)
Jianxin Chen,
Liang Zhou,
Yun Zhang,
David Fondo Ferreiro,
Vol. 7, No. 5, May 30, 2013
10.3837/tiis.2013.05.004
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Muhammad Khurram Khan,
Saru Kumari,
Pitam Singh,
Vol. 7, No. 5, May 30, 2013
10.3837/tiis.2013.05.002
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Yoon-Su Jeong,
Yong-Tae Kim,
Seung-Soo Shin,
Sang-Ho Lee,
Vol. 7, No. 4, April 29, 2013
10.3837/tiis.2013.04.019
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
154.
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model
Syh-Yuan Tan,
Ji-Jian Chin,
Swee-Huay Heng,
Bok-Min Goi,
Vol. 7, No. 4, April 29, 2013
10.3837/tiis.2013.04.018
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
155.
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication
P.Vijayakumar,
S.Bose,
A.Kannan,
L.Jegatha Deborah,
Vol. 7, No. 4, April 29, 2013
10.3837/tiis.2013.04.016
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Yuan Zhou,
Zesong Fei,
Gaishi Huang,
Ang Yang,
Jingming Kuang,
Vol. 7, No. 4, April 29, 2013
10.3837/tiis.2013.04.008
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Jinhyung Kim,
Choonsik Park,
Jun Hwang,
Hyung-Jong Kim,
Vol. 7, No. 3, March 30, 2013
10.3837/tiis.2013.03.009
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)