Author of the publication

Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol.

, and . ICT, page 204-208. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control of soft machines using actuators operated by a Braille display, , , , , , , , and . Lab Chip, 14 (1): 189-199 (2014)Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol., and . ICT, page 204-208. IEEE, (2015)Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption., , and . Int. J. Commun. Networks Distributed Syst., 21 (4): 560-581 (2018)Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan., , and . Comput. Biol. Medicine, (2016)Efficient Information Propagation in Service Routing for Next Generation Network., and . RSKT, volume 5589 of Lecture Notes in Computer Science, page 342-349. Springer, (2009)Towards an Authentication Protocol for Service Outsourcing Over IP Networks., , and . Security and Management, page 3-9. CSREA Press, (2005)Efficient Neighborhood Evaluations for the Vehicle Routing Problem with Multiple Time Windows., , , and . Transp. Sci., 54 (2): 400-416 (2020)An Exact Algorithm for a Rich Vehicle Routing Problem with Private Fleet and Common Carrier., , and . Transp. Sci., 53 (4): 986-1000 (2019)A Review of the State of the Art in Privacy and Security in the eHealth Cloud., , and . IEEE Access, (2021)Self-Authentication of Encrypted Channels in Service Network Graph., and . NPC Workshops, page 163-167. IEEE Computer Society, (2008)