Author of the publication

One-Round Protocols for Two-Party Authenticated Key Exchange.

, , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 220-232. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delaunay Triangles Model for Image-Based Motion Retargeting., and . DEFORM/AVATARS, volume 196 of IFIP Conference Proceedings, page 158-168. Kluwer, (2000)GA based Adaptive Sampling for Image-based Walkthrough., , and . EGVE, page 135-142. Eurographics Association, (2006)Fraud and financial crime detection model using malware forensics., , , and . Multimedia Tools Appl., 68 (2): 479-496 (2014)Data-mining based SQL injection attack detection using internal query trees., and . Expert Syst. Appl., 41 (11): 5416-5430 (2014)E2PKA: An Energy-Efficient and PV-Based Key Agreement Scheme for Body Area Networks., , and . Wireless Personal Communications, 97 (1): 977-998 (2017)Countermeasure against Side-Channel Attack in Shared Memory of TrustZone., and . CoRR, (2017)A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method., , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 93-99. Springer, (2012)Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations., and . IACR Cryptology ePrint Archive, (2005)Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme., and . IACR Cryptology ePrint Archive, (2014)Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006., , and . IACR Cryptology ePrint Archive, (2007)