Author of the publication

Robust authentication and key agreement scheme preserving the privacy of secret key.

, , and . Comput. Commun., 34 (3): 274-280 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blind Threshold Signatures Based on Discrete Logarithm., and . ASIAN, volume 1179 of Lecture Notes in Computer Science, page 172-181. Springer, (1996)Efficient password authenticated key agreement using smart cards.. Comput. Secur., 23 (2): 167-173 (2004)A collision-free secret ballot protocol for computerized general elections., and . Comput. Secur., 15 (4): 339-348 (1996)Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments., , , , and . MobiQuitous (Adjunct Proceedings), page 88-93. ACM, (2016)A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments., , , and . MUE, page 313-318. IEEE Computer Society, (2007)Provably secure and efficient identification and key agreement protocol with user anonymity., , and . J. Comput. Syst. Sci., 77 (4): 790-798 (2011)Anonymous channel and authentication in wireless communications., , and . Comput. Commun., 22 (15-16): 1502-1511 (1999)Robust authentication and key agreement scheme preserving the privacy of secret key., , and . Comput. Commun., 34 (3): 274-280 (2011)An electronic online bidding auction protocol with both security and efficiency., , and . Appl. Math. Comput., 174 (2): 1487-1497 (2006)D-cash: A flexible pre-paid e-cash scheme for date-attachment.. Electron. Commer. Res. Appl., 6 (1): 74-80 (2007)