Author of the publication

Password Authenticated Key Exchange and Protected Password Change Protocols.

, , and . Symmetry, 9 (8): 134 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments., , , and . Symmetry, 10 (4): 84 (2018)A Solution to Mobile IP Registration for AAA., , , and . CDMA International Conference, volume 2524 of Lecture Notes in Computer Science, page 329-337. Springer, (2002)A Fast and Noise Tolerable Binarization Method for Automatic License Plate Recognition in the Open Environment in Taiwan., , , , , and . Symmetry, 12 (8): 1374 (2020)New soft biometrics for limited resource in keystroke dynamics authentication., , , , and . Multim. Tools Appl., 79 (31-32): 23295-23324 (2020)A threshold signature scheme for group communications without a shared distribution center., , and . Future Gener. Comput. Syst., 20 (6): 1013-1021 (2004)A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem., , and . Comput. Stand. Interfaces, 25 (2): 141-145 (2003)A (t, n) multi-secret sharing scheme., , and . Appl. Math. Comput., 151 (2): 483-490 (2004)A personalized e-course composition based on a genetic algorithm with forcing legality in an adaptive learning system., and . J. Netw. Comput. Appl., 36 (1): 533-542 (2013)Mobile IP Assistance in Ad Hoc Routing Security Using Geometric Properties of Lines., , and . IEICE Trans. Commun., 88-B (6): 2557-2565 (2005)A New Group Signature Scheme Based on RSA Assumption., , and . Inf. Technol. Control., 42 (1): 61-66 (2013)