Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings.. IACR Cryptology ePrint Archive, (2006)On the Revocation of Proxy Signatures.. IMECS, page 160-162. Newswood Limited, (2006)Optimal age-replacement model with age-dependent type of failure and random lead time based on a cumulative repair-cost limit policy., , and . Ann. Oper. Res., 181 (1): 723-744 (2010)Authenticated Diffie-Hellman Key Agreement Scheme that Protects Client Anonymity and Achieves Half-Forward Secrecy.. Mob. Inf. Syst., (2015)On optimal preventive-maintenance policy for generalized Polya process repairable products under free-repair warranty., , and . Eur. J. Oper. Res., 279 (1): 68-78 (2019)The optimal preventive-maintenance policy for a NHPBP repairable system under free-repair warranty.. Reliab. Eng. Syst. Saf., (2019)Using Ontology to Establish Social Context and Support Social Reasoning., , , and . IVA, volume 3661 of Lecture Notes in Computer Science, page 344-357. Springer, (2005)Collaborative Modes on Collaborative Problem Solving., , , , , and . HCI (5), volume 9735 of Lecture Notes in Computer Science, page 3-10. Springer, (2016)A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security., , , and . GPC, volume 6104 of Lecture Notes in Computer Science, page 407-417. Springer, (2010)An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System., and . IJDSN, (2015)