Author of the publication

Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment.

, , , and . KSII Trans. Internet Inf. Syst., 6 (2): 751-765 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the security of a password-only authenticated three-party key exchange protocol., , , and . IACR Cryptology ePrint Archive, (2013)Secure Group Communications over Combined Wired/Wireless Networks., , , and . IACR Cryptology ePrint Archive, (2004)Digital Optoelectrical Pulse Method for Vernier-Type Rotary Encoders., , , and . IEEE Trans. Instrumentation and Measurement, 65 (2): 431-440 (2016)Association Rule Extraction from XML Stream Data for Wireless Sensor Networks., , , and . Sensors, 14 (7): 12937-12957 (2014)Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees., , , , , and . KES (1), volume 4692 of Lecture Notes in Computer Science, page 672-679. Springer, (2007)Influence of Information Product Quality on Informing Users: A Web Portal Context.. Informing Sci. Int. J. an Emerg. Transdiscipl., (2016)Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography., , , , , and . Sensors, 14 (6): 10081-10106 (2014)Web portal quality.. SOLI, page 163-168. IEEE, (2009)An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 424-427 (2015)Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (1): 213-218 (2006)