From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An improvement of Hsiang-Shih's authentication scheme using smart cards., , и . ICWET, стр. 19-25. ACM, (2010)Network-based detection of Android malicious apps., , и . Int. J. Inf. Sec., 16 (4): 385-400 (2017)SSO password-based multi-server authentication protocol., , и . Int. J. Commun. Networks Distributed Syst., 9 (1/2): 161-180 (2012)Secure Dynamic Identity-Based Remote User Authentication Scheme., , и . ICDCIT, том 5966 из Lecture Notes in Computer Science, стр. 224-235. Springer, (2010)Inverse Cookie-based Virtual Password Authentication Protocol., , и . Int. J. Netw. Secur., 13 (2): 98-108 (2011)Improved Detection of P2P Botnets through Network Behavior Analysis., , и . SNDS, том 420 из Communications in Computer and Information Science, стр. 334-345. Springer, (2014)An improvement of Xu et al.'s authentication scheme using smart cards., , и . Bangalore Compute Conf., стр. 15:1-15:5. ACM, (2010)Secure Itineraries Framework for Mobile Agent Systems., , и . ICISS, том 4332 из Lecture Notes in Computer Science, стр. 361-364. Springer, (2006)A secure dynamic identity based authentication protocol for multi-server architecture., , и . J. Netw. Comput. Appl., 34 (2): 609-618 (2011)Dynamic identity-based single password anti-phishing protocol., , и . Secur. Commun. Networks, 4 (4): 418-427 (2011)