Author of the publication

Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.

, , , , , and . NSS, volume 9955 of Lecture Notes in Computer Science, page 47-61. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Gen2-Based RFID Authentication Protocol for Security and Privacy., and . IEEE Trans. Mob. Comput., 8 (8): 1052-1062 (2009)Cryptanalysis of a public-key cryptosystem based on generalized inverses of matrices.. IEEE Communications Letters, 5 (2): 61-63 (2001)DepenDNS: Dependable Mechanism against DNS Cache Poisoning., , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 174-188. Springer, (2009)Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits., , , , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 49-63. Springer, (2008)On Private-Key Cryptosystems Based on Product Codes., and . ACISP, volume 1438 of Lecture Notes in Computer Science, page 68-79. Springer, (1998)Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack., , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 116-128. Springer, (2007)Secure broadcasting in large networks., and . Comput. Commun., 21 (3): 279-283 (1998)On the Security of Chien's Ultralightweight RFID Authentication Protocol., , and . IEEE Trans. Dependable Secur. Comput., 8 (2): 315-317 (2011)On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme., , and . IEEE Trans. Dependable Secur. Comput., 6 (2): 159-160 (2009)Data embedding in image-media using weight-function on modulo operations., , , and . ACM Trans. Embed. Comput. Syst., 12 (2): 21:1-21:12 (2013)