Author of the publication

An Efficient Authentication Protocol for Mobile Networks.

, , and . J. Inf. Sci. Eng., 15 (4): 505-520 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Fault-Tolerant Design for Multiple-Server VOD Systems., and . Multimedia Tools Appl., 8 (2): 219-247 (1999)Secure Authentication Protocols Resistant to Guessing Attacks., , and . J. Inf. Sci. Eng., 22 (5): 1125-1143 (2006)Password authentication schemes with smart cards., and . Comput. Secur., 18 (8): 727-733 (1999)Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes., and . ACM Conference on Computer and Communications Security, page 153-156. ACM, (1996)Dynamic Load Balancing in Parallel Simulation Using Time Warp Mechanism., , and . ICPADS, page 222-229. IEEE Computer Society, (1994)A Comment on Ä Total Ordering Multicast Protocol Using Propagation Trees"., and . IEEE Trans. Parallel Distributed Syst., 8 (10): 1084 (1997)Optimal information-dispersal for fault-tolerant communication over a burst-error channel., , and . IEEE Trans. Reliability, 52 (3): 354-366 (2003)On Constructing Secret Sharing Schemes., and . INFOCOM, page 1288-1292. IEEE Computer Society, (1994)A Note on Breaking and Repairing a Secure Broadcasting in Large Networks., , and . Comput. Commun., 22 (2): 193-194 (1999)Secret Sharing in Graph-Based Prohibited Structures., and . INFOCOM, page 718-724. IEEE Computer Society, (1997)