From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications., , , и . ICISC, том 1787 из Lecture Notes in Computer Science, стр. 156-168. Springer, (1999)Hardware Fault Attackon RSA with CRT Revisited., , и . ICISC, том 2587 из Lecture Notes in Computer Science, стр. 374-388. Springer, (2002)Efficient Distributed Signcryption Scheme as Group Signcryption., и . ACNS, том 2846 из Lecture Notes in Computer Science, стр. 403-417. Springer, (2003)Asymmetric Key Pre-distribution Scheme for sensor networks., , , и . IEEE Trans. Wirel. Commun., 8 (3): 1366-1372 (2009)Keying material based key pre-distribution scheme., , , и . ISI, стр. 218-221. IEEE, (2008)An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing., , и . Int. J. Netw. Secur., 11 (1): 17-22 (2010)Low-Cost and Strong-Security RFID Authentication Protocol., , , и . EUC Workshops, том 4809 из Lecture Notes in Computer Science, стр. 795-807. Springer, (2007)On the Security of the Canetti-Krawczyk Model., , и . CIS (2), том 3802 из Lecture Notes in Computer Science, стр. 356-363. Springer, (2005)Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation., , , и . ISPAN, стр. 243-248. IEEE Computer Society, (2009)Dragon: A Fast Word Based Stream Cipher., , , , , , , и . ICISC, том 3506 из Lecture Notes in Computer Science, стр. 33-50. Springer, (2004)