Author of the publication

Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy.

, , and . Int. J. Netw. Secur., 7 (2): 181-186 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy., , and . Int. J. Netw. Secur., 7 (2): 181-186 (2008)Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing., , and . Int. J. Netw. Secur., 7 (3): 342-347 (2008)CACPA: Credible Alliance-Chain-Based Public Auditing Scheme for Cloud Storage., , , , and . IEEE Access, (2023)Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings., , and . IMSCCS (2), page 109-112. IEEE Computer Society, (2006)0-7695-2581-4.Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications., and . IACR Cryptology ePrint Archive, (2007)Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare., , , , , and . IEEE Internet Things J., 11 (6): 9599-9609 (March 2024)On the anonymity of some authentication schemes for wireless communications., , , and . IEEE Commun. Lett., 13 (3): 170-171 (2009)Security weakness in a dynamic program update protocol for wireless sensor networks., , , and . IEEE Commun. Lett., 13 (6): 426-428 (2009)New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles)., , and . IACR Cryptology ePrint Archive, (2006)Analysis of USBSCAN Driver., , and . ICMLSC, page 187-190. ACM, (2017)