Author of the publication

A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.

, , , , , and . NSS, volume 11058 of Lecture Notes in Computer Science, page 111-124. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-optimal tool motion planning with tool-tip kinematic constraints for robotic machining of sculptured surfaces., , , , and . Robotics Comput. Integr. Manuf., (2020)An optimisation for a two-round good-case latency protocol., , , , , and . IET Inf. Secur., 17 (4): 664-680 (July 2023)Towards load balancing in IoV system: A vehicle-assisted batch verification scheme., , , , and . Veh. Commun., (December 2023)Apply Genetic Algorithm to Cloud Motion Wind., , , , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 781-789. Springer, (2013)A New Post-Quantum Blind Signature From Lattice Assumptions., , , , and . IEEE Access, (2018)Game-Theoretic Learning Approaches for Secure D2D Communications Against Full-Duplex Active Eavesdropper., , , , , and . IEEE Access, (2019)A comparison of clustering algorithms applied to fluid characterization using NMR T1-T2 maps of shale., , , , , and . Comput. Geosci., (2019)Unsupervised Temporal Action Localization via Self-paced Incremental Learning., , , , , and . CoRR, (2023)SPSQL: Step-by-step Parsing Based Framework for Text-to-SQL Generation., , , , , and . CoRR, (2023)AccidentGPT: Accident Analysis and Prevention from V2X Environmental Perception with Multi-modal Large Model., , , , , , , , , and 2 other author(s). CoRR, (2023)