Author of the publication

An Analysis of Server-Side Design for Seed-Based Mobile Authentication.

, , , and . CSCloud, page 60-65. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Carp: A cost-aware relaxed protocol for encrypted data stores., , and . J. Inf. Secur. Appl., (2020)Seed-based authentication for mobile clients across multiple devices., , and . Inf. Secur. J. A Glob. Perspect., 27 (1): 29-41 (2018)Image-Based Seed Generation., and . CIC, page 439-444. IEEE Computer Society, (2016)Method for secure credit card transaction., and . CTS, page 180-184. IEEE, (2013)Method for two dimensional honeypot in a web application., and . CollaborateCom, page 681-686. ICST / IEEE, (2012)Method for a two dimensional honeypot to deter web bots in commerce systems., and . CASoN, page 250-256. IEEE, (2012)Enhanced mobile security using SIM encryption., , and . CTS, page 189-196. IEEE, (2014)Context Sensitive Smart Device Command Recognition and Negotiation., , , , and . IoT360 (1), volume 150 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 314-330. Springer, (2014)Multi Seed Authentication Using S/Key Scheme., and . HPCC/CSS/ICESS, page 1225-1229. IEEE, (2015)Seed-based authentication., and . CTS, page 345-350. IEEE, (2015)