Author of the publication

A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems.

, , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 92-101. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks., , , , and . Sensors, 14 (4): 6443-6462 (2014)A secure user-friendly authentication scheme with anonymity for wireless communications., , and . ICUIMC, page 110. ACM, (2013)Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards., , and . ISPEC, volume 6047 of Lecture Notes in Computer Science, page 377-385. Springer, (2010)Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks., , , , and . ICCSA (2), volume 10961 of Lecture Notes in Computer Science, page 50-61. Springer, (2018)An Attack on an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard., , , and . ICHIT (1), volume 6935 of Lecture Notes in Computer Science, page 488-495. Springer, (2011)Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments., , and . IJDSN, (2015)Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols., , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 1-9. Springer, (2005)Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment., , and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 233-240. Springer, (2012)Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User., , , and . Secur. Commun. Networks, (2017)A Study on Security Risk Modeling over Information and Communication Infrastructure., , , and . Security and Management, page 249-253. CSREA Press, (2004)