Author of the publication

An improved two-party identity-based authenticated key agreement protocol using pairings.

, , and . J. Comput. Syst. Sci., 78 (1): 142-150 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparisons between Three Cross-Validation Methods for Measuring Learners' Performances., , and . EJC, volume 272 of Frontiers in Artificial Intelligence and Applications, page 77-87. IOS Press, (2014)Assessment of Classification Models with Small Amounts of Data., , , , , and . Informatica, 18 (3): 343-362 (2007)Rejecting the death of passwords: Advice for the future., and . Comput. Sci. Inf. Syst., 16 (1): 313-332 (2019)Data protection for outsourced data mining., , , , , and . Informatica (Slovenia), (2002)WSDL and UDDI extensions for version support in web services., , , and . J. Syst. Softw., 82 (8): 1326-1343 (2009)Responsible Artificial Intelligence: A Structured Literature Review., , and . CoRR, (2024)Overview of Machine Learning Process Modelling., , and . Entropy, 23 (9): 1123 (2021)Two proposed identity-based three-party authenticated key agreement protocols from pairings., , and . Comput. Secur., 29 (2): 244-252 (2010)User Experience of Croatian National & Nature Parks' Website - A Comparison., , and . HCI (43), volume 1832 of Communications in Computer and Information Science, page 561-570. Springer, (2023)Permissions vs. Privacy Policies of Apps in Google Play Store and Apple App Store., , and . EJC, volume 364 of Frontiers in Artificial Intelligence and Applications, page 258-275. IOS Press, (2022)