Author of the publication

Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way.

, , , and . IEICE Trans. Inf. Syst., 91-D (5): 1457-1465 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust control scheme for a class of uncertain nonlinear systems with completely unknown dynamics using data-driven reinforcement learning method., , , and . Neurocomputing, (2018)A Probabilistic Model-Based Method With Nonlocal Filtering for Robust Magnetic Resonance Imaging Reconstruction., , and . IEEE Access, (2020)A Fuzzy Adaptive Tracking Control for MIMO Switched Uncertain Nonlinear Systems in Strict-Feedback Form., , , and . IEEE Trans. Fuzzy Syst., 27 (12): 2443-2452 (2019)IKEv2-Derived Shared Secret Key for the One-Way Active Measurement Protocol (OWAMP) and Two-Way Active Measurement Protocol (TWAMP)., , and . RFC, (December 2015)A novel similarity based quality metric for image fusion., , , and . Inf. Fusion, 9 (2): 156-160 (2008)Efficient Hybrid Encryption from ID-Based Encryption., , , and . IACR Cryptology ePrint Archive, (2007)Adaptive control for a class of uncertain strict-feedback nonlinear systems based on a generalized fuzzy hyperbolic model., , , and . Fuzzy Sets Syst., (2016)Relations Among Notions of Security for Identity Based Encryption Schemes., , , , , , and . IACR Cryptology ePrint Archive, (2005)Compact Conversion Schemes for the Probabilistic OW-PCA Primitives., , and . ICICS, volume 2836 of Lecture Notes in Computer Science, page 269-279. Springer, (2003)Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE., , , and . AAECC, volume 5527 of Lecture Notes in Computer Science, page 159-168. Springer, (2009)