Author of the publication

Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.

, , , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 227-238. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Object-Oriented Numerical Libraries., and . Software Engineering Research and Practice, page 253-258. CSREA Press, (2006)Attacks on the AKACP Protocol., , , , and . IACR Cryptology ePrint Archive, (2010)Pairing-Based Cryptography on the Internet of Things: A Feasibility Study., , , , and . WWIC, volume 10866 of Lecture Notes in Computer Science, page 219-230. Springer, (2018)Facilitating software extension with design patterns and Aspect-Oriented Programming., , and . J. Syst. Softw., 81 (10): 1725-1737 (2008)The concept of security and trust in electronic payments., and . Comput. Secur., 24 (1): 10-15 (2005)The economic approach of information security., and . Comput. Secur., 24 (2): 105-108 (2005)An Implementation Infrastructure for Server-Passive Timed-Release Cryptography., , , and . IAS, page 89-94. IEEE Computer Society, (2008)The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes., , and . SECRYPT, page 403-407. SciTePress, (2012)Improved Anonymous Timed-Release Encryption., , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 311-326. Springer, (2007)Leakage-resilient lattice-based partially blind signatures., , , and . IET Inf. Secur., 13 (6): 670-684 (2019)