Author of the publication

Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments.

, , , and . Symmetry, 10 (4): 84 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Solution to Mobile IP Registration for AAA., , , and . CDMA International Conference, volume 2524 of Lecture Notes in Computer Science, page 329-337. Springer, (2002)A threshold signature scheme for group communications without a shared distribution center., , and . Future Gener. Comput. Syst., 20 (6): 1013-1021 (2004)Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments., , , and . Symmetry, 10 (4): 84 (2018)A (t, n) multi-secret sharing scheme., , and . Appl. Math. Comput., 151 (2): 483-490 (2004)A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem., , and . Comput. Stand. Interfaces, 25 (2): 141-145 (2003)A personalized e-course composition based on a genetic algorithm with forcing legality in an adaptive learning system., and . J. Netw. Comput. Appl., 36 (1): 533-542 (2013)New soft biometrics for limited resource in keystroke dynamics authentication., , , , and . Multim. Tools Appl., 79 (31-32): 23295-23324 (2020)A Fast and Noise Tolerable Binarization Method for Automatic License Plate Recognition in the Open Environment in Taiwan., , , , , and . Symmetry, 12 (8): 1374 (2020)Mobile IP Assistance in Ad Hoc Routing Security Using Geometric Properties of Lines., , and . IEICE Trans. Commun., 88-B (6): 2557-2565 (2005)A New Group Signature Scheme Based on RSA Assumption., , and . Inf. Technol. Control., 42 (1): 61-66 (2013)