Author of the publication

An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.

, , and . J. Comput. Methods Sci. Eng., 13 (5-6): 455-460 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System., , and . J. Medical Systems, 40 (5): 117:1-117:15 (2016)A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System., , , and . J. Medical Systems, 39 (11): 144:1-144:11 (2015)Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services., , and . IOV, volume 8662 of Lecture Notes in Computer Science, page 367-375. Springer, (2014)A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period., , and . ICCSA (3), volume 4707 of Lecture Notes in Computer Science, page 273-284. Springer, (2007)On security of a more efficient and secure dynamic ID-based remote user authentication scheme., , , and . ISDA, page 1371-1375. IEEE, (2010)A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks., , and . Comput. Commun., 31 (12): 2803-2814 (2008)A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps., , and . IEEE Access, (2018)Cryptanalysis of Än Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System"., , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 282-289. Springer, (2017)Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks., , and . Parallel Process. Lett., 21 (1): 21-26 (2011)A secure routing protocol with node selfishness resistance in MANETs., , and . Int. J. Mob. Commun., 10 (1): 103-118 (2012)