From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks., , , , и . ICDIM, стр. 139-143. IEEE, (2017)An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments., , , , и . IEICE Trans. Commun., 95-B (7): 2505-2508 (2012)Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity., , , , и . Secur. Commun. Networks, (2018)Hybrid Key Management Architecture for Robust SCADA Systems., , , и . J. Inf. Sci. Eng., 29 (2): 281-298 (2013)Software Birthmark Method Using Combined Structure-Based and API-Based., , , и . J. Softw., 12 (2): 138-144 (2017)Performance and security enhanced authentication and key agreement protocol for SAE/LTE network., , , , и . Comput. Networks, (2016)Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (7): 2084-2087 (2006)Improvement and Weakness of Zero-Sum Defender against Return-Oriented Programming Attacks., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (12): 2585-2590 (2016)On the Security of Girault Key Agreement Protocols against Active Attacks., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (5): 1181-1189 (2003)Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment., , , и . KSII Trans. Internet Inf. Syst., 6 (2): 751-765 (2012)