Author of the publication

Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments.

, , , and . Symmetry, 10 (4): 84 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion., , , , and . Comput. J., 58 (7): 1598-1606 (2015)Reversible data hiding scheme based on neighboring pixel differences., , and . Digit. Signal Process., 23 (3): 919-927 (2013)Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem., , and . IEICE Trans. Commun., 88-B (5): 2171-2172 (2005)Cryptanalysis of some user identification schemes for distributed computer networks., , and . Int. J. Commun. Syst., 27 (11): 2909-2917 (2014)Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments., , , and . Symmetry, 10 (4): 84 (2018)Refinements of Miller's Algorithm over Weierstrass Curves Revisited., and . Comput. J., 54 (10): 1582-1591 (2011)Speeding up Pairing Computation Using Non-adjacent Form and ELM Method., , and . Int. J. Netw. Secur., 18 (1): 108-115 (2016)Further Refinement of Pairing Computation Based on Miller's Algorithm., , and . IACR Cryptology ePrint Archive, (2006)Computing the modular inverses is as simple as computing the GCDs., , and . Finite Fields Their Appl., 14 (1): 65-75 (2008)An Image Hiding Scheme by Linking Pixels in the Circular Way., , and . KSII Trans. Internet Inf. Syst., 6 (6): 1718-1734 (2012)