Author of the publication

Two-Way Graphic Password for Mobile User Authentication.

, , , and . CSCloud, page 476-481. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile device protection from loss and capture., , , and . PETRA, volume 282 of ACM International Conference Proceeding Series, page 41. ACM, (2008)Dynamic Information Fusion and Evidence Equilibrium., , and . IC-AI, page 769-775. CSREA Press, (2009)Event-based experiments in an assistive environment using wireless sensor networks and voice recognition., , , , and . PETRA, ACM, (2009)Source location privacy against laptop-class attacks in sensor networks., , , , and . SecureComm, page 5. ACM, (2008)A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model., , , and . ISC, volume 3225 of Lecture Notes in Computer Science, page 280-291. Springer, (2004)On-demand security service., , , , and . PETRA, page 7. ACM, (2012)Preventing Unofficial Information Propagation., , , , and . ICICS, volume 4861 of Lecture Notes in Computer Science, page 113-125. Springer, (2007)Local data protection for in-network processing in sensor networks., , , and . ICPS, page 69-78. IEEE Computer Society, (2005)Entrapping Adversaries for Source Protection in Sensor Networks., , , , and . WOWMOM, page 23-34. IEEE Computer Society, (2006)Mobile Anchor-Free Localization for Wireless Sensor Networks., , , , and . DCOSS, volume 4549 of Lecture Notes in Computer Science, page 96-109. Springer, (2007)