Author of the publication

Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting.

, , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 255-267. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fully Secure Decentralized Ciphertext-Policy Attribute-Based Encryption in Standard Model., , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 427-447. Springer, (2018)Password Authenticated Key Exchange Based on RSA in the Three-Party Settings., , and . ProvSec, volume 5848 of Lecture Notes in Computer Science, page 168-182. Springer, (2009)A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques., , and . IJDSN, (2015)A New Strongly Secure Authenticated Key Exchange Protocol., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 135-144. Springer, (2009)A Rational Secret Sharing Relying on Reputation., , , and . INCoS, page 384-387. IEEE, (2016)Forgeability of Wang-Zhu-Feng-Yau's Attribute-Based Signature with Policy-and-Endorsement Mechanism., , , , and . J. Comput. Sci. Technol., 28 (4): 743-748 (2013)Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks., and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 182-191. Springer, (2007)An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication on Koblitz Curves for Cloud Computing., , , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 542-551. Springer, (2017)mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group., , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 407-421. Springer, (2014)Two Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks: Formal Model and Secure Construction., , and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 377-388. (2016)