Author of the publication

Designing Authentication Protocols: Trends and Issues.

, , and . ICN/ICONS/MCL, page 76. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive Evolution of Particle Systems for Computer Graphics and Animation., , and . IEEE Trans. Evol. Comput., 13 (2): 418-432 (2009)Simulation Methods and Applications., and . Simul. Pract. Theory, 9 (3-5): 91-93 (2002)The Two's Complement Quasi-Serial Multiplier., and . IEEE Trans. Computers, 24 (12): 1233-1235 (1975)Dynamic microprogramming in a time sharing environment.. MICRO, page 55-60. ACM, (1977)A Distributed Security Architecture for ad hoc Networks., , and . Wireless Information Systems, page 81-91. INSTICC Press, (2005)972-8865-21-X.Enhancing Message Privacy in WEP., and . Wireless Information Systems, page 23-32. INSTICC Press, (2005)972-8865-21-X.A Secure Service-Oriented Routing Algorithm for Heterogeneous Wireless Mesh Networks., , and . GLOBECOM, page 1-5. IEEE, (2011)Understanding the intruder through attacks on cryptographic protocols., , and . ACM Southeast Regional Conference, page 667-672. ACM, (2006)Detecting Obfuscated Viruses Using Cosine Similarity Analysis., , and . Asia International Conference on Modelling and Simulation, page 165-170. IEEE Computer Society, (2007)A Parameterized Analysis of Public-Key Protocols: Needham-Schroeder and Kerberos-5., , and . ICON, page 1-6. IEEE, (2006)