Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hawkeye: Finding spamming accounts., , , , , and . APNOMS, page 1-4. IEEE, (2014)PassMap: a map based graphical-password authentication system., , , and . AsiaCCS, page 99-100. ACM, (2012)Eliminating rouge femtocells based on distance bounding protocol and geographic information., , , and . Expert Syst. Appl., 41 (2): 426-433 (2014)SPATE: Small-Group PKI-Less Authenticated Trust Establishment., , , , , , , , , and 3 other author(s). IEEE Trans. Mob. Comput., 9 (12): 1666-1681 (2010)Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack., , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 116-128. Springer, (2007)A collaborative routing protocol against routing disruptions in MANETs., , , and . Personal and Ubiquitous Computing, 17 (5): 865-874 (2013)SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN., , , and . J. Inf. Hiding Multim. Signal Process., 4 (1): 57-72 (2013)oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks., , and . IEEE Trans. Inf. Forensics Secur., 7 (2): 651-663 (2012)Secure and Efficient Handover Schemes for Heterogeneous Networks., , , , and . APSCC, page 205-210. IEEE Computer Society, (2008)The bilateral communication-based dynamic extensible honeypot., , , , , and . ICCST, page 263-268. IEEE, (2015)