Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by R. Suneetha

A Secure Approach to Election Scheme Based on Naccache Stern Knapsack Cryptosystem

International Journal of Computer Applications
2010English

Related publications

A New Trapdoor Knapsack Public Key Cryptosystem

English

Provably Secure Public Key Cryptosystem Based on Chebyshev Polynomials

Journal of Communications
Electronic EngineeringElectrical
2015English

A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

A Homomorphic Encryption-Based Secure Electronic Voting Scheme

Publicationes Mathematicae
Mathematics
2011English

a Provably Secure Code-Based Concurrent Signature Scheme

IET Information Security
Computer NetworksSoftwareInformation SystemsCommunications
2018English

A Secure Scheme for Wireless Sensor Networks Based on Symmetric Polynomials

2015English

A New Cryptosystem Based on Fingerprint Features

International Journal of Computer Applications
2015English

A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2003English

A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

Sensors
InstrumentationInformation SystemsElectronic EngineeringBiochemistryAnalytical ChemistryMolecular Physics,ElectricalAtomicMedicineOptics
2018English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy