Author of the publication

Provably secure authenticated key exchange protocols for low power computing clients.

, , and . Comput. Secur., 25 (2): 106-113 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of Park-Lim key agreement schemes for VSAT satellite communications., , , , , and . IEEE Trans. Vehicular Technology, 52 (2): 465-468 (2003)Mechanical interactions of cuspal-coverage designs and cement thickness in a cusp-replacing ceramic premolar restoration: a finite element study., , , , and . Medical Biol. Eng. Comput., 47 (4): 367-374 (2009)Impersonation Attack on Two-Gene-Relation Password Authentication Protocol (2GR)., and . IEICE Trans. Commun., 89-B (12): 3425-3427 (2006)Privacy and non-repudiation on pay-TV systems., , , and . IEEE Trans. Consumer Electronics, 46 (1): 20-27 (2000)Comparative Study of Slam Algorithms for Mobile Robots in Complex Environment., , , and . CRC, page 74-79. IEEE, (2021)Single-Issue 1500MIPS Embedded DSP with Ultra Compact Codes., , , , and . ASP-DAC, page 110-111. IEEE Computer Society, (2007)Masquerade on One-Time Password Authentication Scheme., and . FGCN (1), page 279-283. IEEE Computer Society, (2007)Efficient and Practical DHEKE Protocols., , and . ACM SIGOPS Oper. Syst. Rev., 35 (1): 41-47 (2001)Buttressing angle of the double-plating fixation of a distal radius fracture: a finite element study., , and . Medical Biol. Eng. Comput., 44 (8): 665-673 (2006)Using Feature Selection to Improve Performance of Three-Tier Intrusion Detection System., , , , , , and . AINA Workshops, volume 927 of Advances in Intelligent Systems and Computing, page 776-785. Springer, (2019)