Author of the publication

Lightweight authentication with key-agreement protocol for mobile network environment using smart cards.

, , , and . IET Inf. Secur., 10 (5): 272-282 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of a simple three-party password-based key exchange protocol., and . Int. J. Commun. Syst., 24 (4): 532-542 (2011)Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks., and . IEICE Trans. Commun., 88-B (6): 2627-2628 (2005)Lightweight authentication with key-agreement protocol for mobile network environment using smart cards., , , and . IET Inf. Secur., 10 (5): 272-282 (2016)Secure PAP-Based RADIUS Protocol in Wireless Networks., , and . ICIC (3), volume 2 of Communications in Computer and Information Science, page 689-694. Springer, (2007)Improving the Host Authentication Mechanism for POD Copy Protection System., and . New Directions in Intelligent Interactive Multimedia, volume 142 of Studies in Computational Intelligence, Springer, (2008)Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce., and . ICIC (3), volume 15 of Communications in Computer and Information Science, page 533-540. Springer, (2008)A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks., and . SAC, page 699-705. ACM, (2014)Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader.. NPC, volume 7513 of Lecture Notes in Computer Science, page 575-580. Springer, (2012)An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card., and . EuroPKI, volume 4043 of Lecture Notes in Computer Science, page 45-53. Springer, (2006)Secure Protected Password Change Scheme., , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 472-477. Springer, (2005)