Author of the publication

An Efficient Convertible Authenticated Encryption Scheme and Its Variant.

, and . ICICS, volume 2836 of Lecture Notes in Computer Science, page 382-392. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Authentication with Anonymity for Roaming Service with Smart Cards in Global Mobility Networks., , , and . Ad Hoc Sens. Wirel. Networks, 20 (1-2): 5-19 (2014)An Efficient Convertible Authenticated Encryption Scheme and Its Variant., and . ICICS, volume 2836 of Lecture Notes in Computer Science, page 382-392. Springer, (2003)A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network.. ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 77-82. Springer, (2008)A New Design of Efficient Key Pre-distribution Scheme for Secure Wireless Sensor Networks.. IIH-MSP, page 253-256. IEEE Computer Society, (2007)A New Design of Access Control in Wireless Sensor Networks.. IJDSN, (2011)An Efficient Mutual Authentication Protocol on RFID Tags.. EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 550-556. Springer, (2007)Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function., and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 554-559. Springer, (2005)An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm., and . MUE, page 982-986. IEEE Computer Society, (2007)A New Cryptographic Key Assignment Scheme using a One-way Hash Function.. JCIS, Atlantis Press, (2006)Analytical Solution for the Time-Fractional Telegraph Equation.. J. Appl. Math., (2009)