Author of the publication

Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange.

, , and . IACR Cryptology ePrint Archive, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Three Constructions of Authentication/Secrecy Codes., , , and . AAECC, volume 2643 of Lecture Notes in Computer Science, page 24-33. Springer, (2003)Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange., , and . IACR Cryptology ePrint Archive, (2005)Improved Efficient Remote User Authentication Schemes., , and . Int. J. Netw. Secur., 4 (2): 149-154 (2007)On the Topology Scaling of Interplanetary Networks., and . NaNA, page 274-280. IEEE, (2023)E-mail protocols with perfect forward secrecy., and . Int. J. Secur. Networks, 7 (1): 1-5 (2012)Three Constructions of Authentication Codes with Perfect Secrecy., and . Des. Codes Cryptogr., 33 (3): 227-239 (2004)On the Fine-Grained Distributed Routing and Data Scheduling for Interplanetary Data Transfers., and . IEEE Trans. Netw. Serv. Manag., 21 (1): 451-462 (February 2024)Multi-Agent and Cooperative Deep Reinforcement Learning for Scalable Network Automation in Multi-Domain SD-EONs., , , and . IEEE Trans. Netw. Serv. Manag., 18 (4): 4801-4813 (2021)On the Distributed Routing and Data Scheduling in Interplanetary Networks., and . ICC, page 1131-1136. IEEE, (2022)Session Corruption Attack and Improvements on Encryption Based MT-Authenticators., and . CT-RSA, volume 3860 of Lecture Notes in Computer Science, page 34-51. Springer, (2006)