Author of the publication

Security Improvement on a Remote User Authentication Scheme Using Smart Cards.

, , and . ISA, volume 76 of Communications in Computer and Information Science, page 9-16. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography., , , , and . Sensors, 11 (5): 4767-4779 (2011)An efficient anonymous authentication protocol for mobile pay-TV., , , and . J. Netw. Comput. Appl., 34 (4): 1131-1137 (2011)A New Performance Analysis Model of the Local Switching System., and . COMPSAC, page 130-136. IEEE Computer Society, (1997)Security enhancement on an improvement on two remote user authentication schemes using smart cards., , and . Future Gener. Comput. Syst., 27 (4): 377-380 (2011)Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data., , , and . IET Inf. Secur., 7 (3): 247-252 (2013)A novel near-infrared array based arterial pulse wave measurement method., , , , , and . BioCAS, page 41-44. IEEE, (2013)A SoC design for portable 2-dimension oximeter image system., , , , and . ISCAS, page 556-559. IEEE, (2012)Security Improvement on a Remote User Authentication Scheme Using Smart Cards., , and . ISA, volume 76 of Communications in Computer and Information Science, page 9-16. Springer, (2010)An Advanced ECC ID-Based Remote Mutual Authentication Scheme for Mobile Devices., , and . UIC/ATC Workshops, page 116-120. IEEE Computer Society, (2010)A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography., , , , and . FGIT-FGCN (1), volume 119 of Communications in Computer and Information Science, page 46-55. Springer, (2010)