Author of the publication

Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function.

, and . Appl. Math. Comput., 162 (1): 211-214 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust authentication and key agreement scheme preserving the privacy of secret key., , and . Comput. Commun., 34 (3): 274-280 (2011)Provably secure and efficient identification and key agreement protocol with user anonymity., , and . J. Comput. Syst. Sci., 77 (4): 790-798 (2011)Secure authentication scheme for session initiation protocol., , and . Comput. Secur., 24 (5): 381-386 (2005)A secure and efficient authentication protocol for anonymous channel in wireless communications., , , and . Appl. Math. Comput., 169 (2): 1431-1439 (2005)Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards., and . Int. J. Netw. Secur., 3 (3): 283-285 (2006)Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards., , and . IEEE Trans. Consumer Electronics, 50 (2): 578-579 (2004)An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards., and . ACM SIGOPS Oper. Syst. Rev., 38 (3): 91-96 (2004)Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks., and . IEICE Trans. Commun., 88-B (11): 4370-4372 (2005)An improvement of the Yang-Shieh password authentication schemes., , and . Appl. Math. Comput., 162 (3): 1391-1396 (2005)Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function., and . Appl. Math. Comput., 162 (1): 211-214 (2005)