Author of the publication

A password authentication scheme with secure password updating.

, and . Comput. Secur., 22 (1): 68-72 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biomechanical optimization of a custom-made positioning and fixing bone plate for Le Fort I osteotomy by finite element analysis., , and . Comput. Biol. Medicine, (2016)Biomechanical evaluation of an orthodontic mini-implant with plastic removal cap: An in-vitro experimental testing., , , , , and . EMBC, page 3183-3185. IEEE, (2013)Blockchain-Based Diagnostic Certificate System with Privacy Protection.. TAAI (1), volume 2074 of Communications in Computer and Information Science, page 257-268. Springer, (2023)Vibration Test and Analysis of a Six-Degree-of-Freedom Cooperative Robot Manipulator End., , , , and . ICIRA (2), volume 13014 of Lecture Notes in Computer Science, page 374-383. Springer, (2021)Proxy-protected signature secure against the undelegated proxy signature attack., , , and . Comput. Electr. Eng., 33 (3): 177-185 (2007)Estimation of the retainer height biomechanical contribution in posterior resin-bonded fixed partial dentures: a structural-thermal coupled finite element analysis., and . Medical Biol. Eng. Comput., 48 (11): 1115-1122 (2010)Design, manufacture and in-vitro evaluation of a new microvascular anastomotic device., , , , , , and . EMBC, page 1831-1834. IEEE, (2013)Integration of CT, CAD system and finite element method to investigate interfacial stresses of resin-bonded prosthesis., , , and . Comput. Methods Programs Biomed., 72 (1): 55-64 (2003)Curriculum Co-Creation: Knowledge Co-Creation in an Educational Context., , and . Int. J. Knowl. Based Organ., 13 (1): 1-24 (2023)Provably secure authenticated key exchange protocols for low power computing clients., , and . Comput. Secur., 25 (2): 106-113 (2006)