From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments., , и . IEEE Trans. Ind. Electron., 53 (5): 1683-1687 (2006)A virtual image cryptosystem based upon vector quantization., , и . IEEE Trans. Image Process., 7 (10): 1485-1488 (1998)A server assisted authentication protocol for detecting error vectors., , и . ACM SIGOPS Oper. Syst. Rev., 38 (2): 93-96 (2004)A key authentication scheme with non-repudiation., , и . ACM SIGOPS Oper. Syst. Rev., 38 (3): 75-78 (2004)An authentication scheme for mobile satellite communication systems., , и . ACM SIGOPS Oper. Syst. Rev., 37 (4): 42-47 (2003)On the Security of Self-Certified Public Keys., , и . Int. J. Inf. Secur. Priv., 5 (2): 54-60 (2011)Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack., , и . Fundam. Informaticae, 61 (3-4): 389-398 (2004)Multilevel Secure Database Encryption with Subkeys., и . Data Knowl. Eng., 22 (2): 117-131 (1997)Enhanced privacy and authentication for the global system for mobile communications., , и . Wireless Networks, 5 (4): 231-243 (1999)A Feature-Oriented Copyright Owner Proving Technique for Still Images., , и . International Journal of Software Engineering and Knowledge Engineering, 12 (3): 317-330 (2002)