Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings., , and . ISPA, volume 4742 of Lecture Notes in Computer Science, page 446-456. Springer, (2007)A Forgery Attack on A Low Computation Cost User Authentication Scheme., and . Int. J. Netw. Secur., 3 (1): 51-53 (2006)On the Security of Signature Scheme with Message Recovery and Its Application., and . Int. J. Netw. Secur., 3 (2): 151-154 (2006)Reversible data hiding scheme with edge-direction predictor and modulo operation., , , and . J. Real-Time Image Processing, 14 (1): 137-145 (2018)A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords., and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 659-663. Springer, (2006)Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting.. Informatica, 20 (1): 139-150 (2009)An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password., and . Informatica, 21 (4): 627-637 (2010)Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem., and . J. Supercomput., 63 (1): 235-255 (2013)Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem., and . Fundam. Informaticae, 87 (3-4): 483-492 (2008)Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard.. Expert Syst. Appl., 39 (1): 1589-1594 (2012)