Author of the publication

A Shoulder Surfing Resistant Graphical Authentication System.

, , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 180-193 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem.. Inf. Process. Lett., 105 (4): 117-120 (2008)A Dynamic Interdomain Communication Path Setup in Active Network., , and . IWAN, volume 1653 of Lecture Notes in Computer Science, page 274-284. Springer, (1999)Integrity coded databases - protecting data integrity for outsourced databases., , , , , and . Comput. Secur., (January 2024)Integrity Coded Databases - Protecting Data Integrity for Outsourced Databases., , , , and . (November 2018)Interdomain Access Control with Policy Routing., , and . FTDCS, page 46-52. IEEE Computer Society, (1997)A Probabilistic Homomorphic Encryption Algorithm over Integers - Protecting Data Privacy in Clouds.. UIC/ATC/ScalCom, page 653-656. IEEE Computer Society, (2015)P2P email encryption by an identity-based one-way group key agreement protocol., , and . ICPADS, page 760-767. IEEE Computer Society, (2014)Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption., , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 776-783. IEEE, (2019)Protecting Internet Public Information Integrity During Transmission., , and . International Conference on Internet Computing, page 308-314. CSREA Press, (2003)Handheld Computing and Programming for Mobile Commerce., , , and . IJWIS, 2 (3/4): 164-175 (2006)