Author of the publication

Towards an Authentication Protocol for Service Outsourcing Over IP Networks.

, , and . Security and Management, page 3-9. CSREA Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol., and . ICT, page 204-208. IEEE, (2015)Control of soft machines using actuators operated by a Braille display, , , , , , , , and . Lab Chip, 14 (1): 189-199 (2014)Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan., , and . Comput. Biol. Medicine, (2016)Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption., , and . Int. J. Commun. Networks Distributed Syst., 21 (4): 560-581 (2018)Efficient Information Propagation in Service Routing for Next Generation Network., and . RSKT, volume 5589 of Lecture Notes in Computer Science, page 342-349. Springer, (2009)Towards an Authentication Protocol for Service Outsourcing Over IP Networks., , and . Security and Management, page 3-9. CSREA Press, (2005)Efficient Neighborhood Evaluations for the Vehicle Routing Problem with Multiple Time Windows., , , and . Transp. Sci., 54 (2): 400-416 (2020)An Exact Algorithm for a Rich Vehicle Routing Problem with Private Fleet and Common Carrier., , and . Transp. Sci., 53 (4): 986-1000 (2019)An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment., , , and . IEEE Access, (2017)Improving Efficiency and Scalability of Service Network Graph by Re-routing Service Routes., and . ACIIDS, page 414-419. IEEE Computer Society, (2009)