Author of the publication

Fortifying password authentication in integrated healthcare delivery systems.

, , and . AsiaCCS, page 255-265. ACM, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery., , , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 40-52. Springer, (2005)Turing assessor: a new tool for cyber security quantification., , and . WCNC, page 629-633. IEEE, (2006)An improved personal CA for personal area networks., and . GLOBECOM, page 1486-1490. IEEE, (2003)Cryptanalysis and improvement on batch verifying multiple RSA digital signatures., , and . Appl. Math. Comput., 172 (2): 1195-1200 (2006)Highly reliable trust establishment scheme in ad hoc networks., , , , , and . Comput. Networks, 45 (6): 687-699 (2004)Access control protocols with two-layer architecture for wireless networks., , , and . Comput. Networks, 51 (3): 655-670 (2007)A data-driven speech enhancement method based on A* longest segment searching technique., , and . Speech Commun., (2017)Shifting Inference Control to User Side: Architecture and Protocol., , , and . IEEE Trans. Dependable Secur. Comput., 7 (2): 189-202 (2010)Security analysis on a conference scheme for mobile communications., , , and . IEEE Trans. Wirel. Commun., 5 (6): 1238-1240 (2006)Flexible authentication of images., , and . VCIP, volume 5150 of Proceedings of SPIE, page 1905-1911. SPIE, (2003)