Author of the publication

Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols.

, , and . Informatica (Slovenia), 33 (3): 347-355 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EduCTX: A blockchain-based higher education credit platform., , , , and . CoRR, (2017)The Impact of Students' Pre-Knowledge on Learning Computer Programming., and . SQAMIA, volume 2508 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Application Challenges of the I/W/SW-OT Paradigm., and . SQAMIA, volume 1375 of CEUR Workshop Proceedings, page 69-74. CEUR-WS.org, (2015)Security and Privacy related Issues in the Internet of Things., , and . EJC, volume 280 of Frontiers in Artificial Intelligence and Applications, page 321-326. IOS Press, (2015)Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme., , and . Cryptologia, 34 (1): 52-59 (2010)A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion., , and . Ad Hoc Networks, (2014)Survey on security in intra-body area network communication., and . Ad Hoc Networks, (2018)Privacy antecedents for SNS self-disclosure: The case of Facebook., , , and . Comput. Hum. Behav., (2015)Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols., , and . Informatica (Slovenia), 33 (3): 347-355 (2009)Best-Fit Learning Curve Model for the C4.5 Algorithm., , , , and . Informatica, 25 (3): 385-399 (2014)