Author of the publication

Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment.

, , and . IACR Cryptology ePrint Archive, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structural reliability analysis based on polynomial chaos, Voronoi cells and dimension reduction technique., and . Reliab. Eng. Syst. Saf., (2019)Array errors active calibration algorithm and its improvement., and . Sci. China Inf. Sci., 53 (5): 1016-1033 (2010)Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound., and . IEEE Trans. Dependable Secur. Comput., 15 (4): 708-722 (2018)Toward the "New Normal": A Surge in Speeding, New Volume Patterns, and Recent Trends in Taxis/For-Hire Vehicles., , , , , , , , , and 4 other author(s). CoRR, (2020)User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs., , and . Secur. Commun. Networks, (2018)Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme., , , , and . IET Inf. Secur., 14 (4): 443-451 (2020)Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography., , , , and . IET Inf. Secur., 14 (6): 724-732 (2020)Intelligent Critic Control With Disturbance Attenuation for Affine Dynamics Including an Application to a Microgrid System., , , and . IEEE Trans. Ind. Electron., 64 (6): 4935-4944 (2017)Full-range adaptive cruise control based on supervised adaptive dynamic programming., , , , , and . Neurocomputing, (2014)On 2-D Direction-of-Arrival Estimation Performance for Rank Reduction Estimator in Presence of Unexpected Modeling Errors., , and . CSSP, 33 (2): 515-547 (2014)