From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Robust authentication and key agreement scheme preserving the privacy of secret key., , и . Comput. Commun., 34 (3): 274-280 (2011)Provably secure and efficient identification and key agreement protocol with user anonymity., , и . J. Comput. Syst. Sci., 77 (4): 790-798 (2011)Secure authentication scheme for session initiation protocol., , и . Comput. Secur., 24 (5): 381-386 (2005)Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards., , и . IEEE Trans. Consumer Electronics, 50 (2): 578-579 (2004)A secure and efficient authentication protocol for anonymous channel in wireless communications., , , и . Appl. Math. Comput., 169 (2): 1431-1439 (2005)Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards., и . Int. J. Netw. Secur., 3 (3): 283-285 (2006)An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards., и . ACM SIGOPS Oper. Syst. Rev., 38 (3): 91-96 (2004)A protected password change protocol, , и . CoRR, (2005)Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function., и . Appl. Math. Comput., 162 (1): 211-214 (2005)Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks., и . IEICE Trans. Commun., 88-B (11): 4370-4372 (2005)