Author of the publication

Achieving One-Round Password-Based Authenticated Key Exchange over Lattices.

, and . IEEE Trans. Serv. Comput., 15 (1): 308-321 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Common pattern of population decline for freshwater cetacean species in deteriorating habitats, , , , and . Freshwater Biology, 57 (6): 1266--1276 (March 2012)Switched control of type-2 polynomial discrete fuzzy systems based on SOS., , and . FSKD, page 108-113. IEEE, (2013)Full-range adaptive cruise control based on supervised adaptive dynamic programming., , , , , and . Neurocomputing, (2014)On 2-D Direction-of-Arrival Estimation Performance for Rank Reduction Estimator in Presence of Unexpected Modeling Errors., , and . CSSP, 33 (2): 515-547 (2014)On the Security of an Improved Password Authentication Scheme Based on ECC., and . IACR Cryptology ePrint Archive, (2012)Zipf's Law in Passwords., , and . IACR Cryptology ePrint Archive, (2014)Evolutionary Game Analysis of Pollutant Abatement with Collective-Risk., , and . IEEM, page 6-13. IEEE, (2019)Cookie-Proxy: A Scheme to Prevent SSLStrip Attack., , , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 365-372. Springer, (2012)xDFT: An Extensible Dynamic Fault Tolerance Model for Cooperative System., , , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 555-559. Springer, (2006)The application of Han Dynasty cultural elements to modern product design., , , , and . ICAC, page 79-82. IEEE, (2014)