Author of the publication

Analysis and improvement of an authenticated key exchange protocol for sensor networks.

, , and . IEEE Communications Letters, 9 (11): 970-972 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange., , and . IACR Cryptology ePrint Archive, (2005)Three Constructions of Authentication/Secrecy Codes., , , and . AAECC, volume 2643 of Lecture Notes in Computer Science, page 24-33. Springer, (2003)Improved Efficient Remote User Authentication Schemes., , and . Int. J. Netw. Secur., 4 (2): 149-154 (2007)On the Topology Scaling of Interplanetary Networks., and . NaNA, page 274-280. IEEE, (2023)Three Constructions of Authentication Codes with Perfect Secrecy., and . Des. Codes Cryptogr., 33 (3): 227-239 (2004)E-mail protocols with perfect forward secrecy., and . Int. J. Secur. Networks, 7 (1): 1-5 (2012)On the Fine-Grained Distributed Routing and Data Scheduling for Interplanetary Data Transfers., and . IEEE Trans. Netw. Serv. Manag., 21 (1): 451-462 (February 2024)Multi-Agent and Cooperative Deep Reinforcement Learning for Scalable Network Automation in Multi-Domain SD-EONs., , , and . IEEE Trans. Netw. Serv. Manag., 18 (4): 4801-4813 (2021)On the Distributed Routing and Data Scheduling in Interplanetary Networks., and . ICC, page 1131-1136. IEEE, (2022)Session Corruption Attack and Improvements on Encryption Based MT-Authenticators., and . CT-RSA, volume 3860 of Lecture Notes in Computer Science, page 34-51. Springer, (2006)