Author of the publication

Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.

, , , and . Wireless Personal Communications, 94 (3): 1281-1296 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography., , , , and . Int. J. Electron. Secur. Digit. Forensics, 11 (1): 96-117 (2019)限制式滿足及機率最佳化的中文斷詞方法 (Chinese Word Segmentation based on Constraint satisfaction and Statistical Optimization) In Chinese., , and . ROCLING, page 147-165. The Association for Computational Linguistics and Chinese Language Processing (ACLCLP), (1991)Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks., , and . Parallel Process. Lett., 21 (1): 21-26 (2011)Security enhancement on an RFID ownership transfer protocol based on cloud., , , , and . Future Gener. Comput. Syst., (2019)Time-bound key-aggregate encryption for cloud storage., , , and . Secur. Commun. Networks, 9 (13): 2059-2069 (2016)Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks., , , and . Wireless Personal Communications, 94 (3): 1281-1296 (2017)The Postprocessing of Optical Character Recognition Based on Statistical Noisy Channel and Language Model., and . PACLIC, page 127-132. City University of Hong Kong, (1995)Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud., , , , and . CSCloud/EdgeCom, page 134-139. IEEE Computer Society, (2018)