Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancement of the RFID security method with ownership transfer., , , and . ICUIMC, page 251-254. ACM, (2009)An Efficient Non-repudiation Mechanism for SIP-Based Services., , and . IIH-MSP, page 1541-1544. IEEE Computer Society, (2008)Remote User Authentication Scheme with User Anonymity., , and . Security and Management, page 412-420. CSREA Press, (2005)A self-verification authentication mechanism for mobile satellite communication systems., , and . Comput. Electr. Eng., 35 (1): 41-48 (2009)A round- and computation-efficient three-party authenticated key exchange protocol., , and . J. Syst. Softw., 81 (9): 1581-1590 (2008)Self-Stabilization Neighborhood Synchronizer for Uniform Rings., , , , and . PDPTA, page 346-352. CSREA Press, (2005)Secure communication between set-top box and smart card for fair use in DTV broadcasting., , and . ISI, page 156-158. IEEE, (2010)A secure on-line software transaction scheme., , and . Comput. Stand. Interfaces, 27 (3): 303-312 (2005)Revisited - The Subliminal Channel in Blockchain and Its Application to IoT Security., , , and . Symmetry, 13 (5): 855 (2021)Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks., , , and . Comput. Stand. Interfaces, 30 (1-2): 95-99 (2008)