Author of the publication

An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider Attack.

, , and . ICITCS, page 1-4. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords., and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 75-90. (2005)Secure Index Search for Groups., , and . TrustBus, volume 3592 of Lecture Notes in Computer Science, page 128-140. Springer, (2005)Predictability of Android OpenSSL's pseudo random number generator., , and . ACM Conference on Computer and Communications Security, page 659-668. ACM, (2013)Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials., , , and . IEEE Access, (2020)Generic construction of designated tester public-key encryption with keyword search., , and . Inf. Sci., (2012)Extensible Interface Using Projector-Based Augmentation., , , and . CGVR, page 132-137. CSREA Press, (2006)Intrinsic Camera Calibration Based on Radical Center Estimation., , and . CISST, page 7-13. CSREA Press, (2004)Vulnerabilities of Android OS-Based Telematics System., , , , and . Wireless Personal Communications, 92 (4): 1511-1530 (2017)Robust E-mail protocols with perfect forward secrecy., , and . IEEE Communications Letters, 10 (6): 510-512 (2006)Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols., and . IACR Cryptology ePrint Archive, (2005)