Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provably secure and efficient identification and key agreement protocol with user anonymity., , and . J. Comput. Syst. Sci., 77 (4): 790-798 (2011)Robust authentication and key agreement scheme preserving the privacy of secret key., , and . Comput. Commun., 34 (3): 274-280 (2011)Secure authentication scheme for session initiation protocol., , and . Comput. Secur., 24 (5): 381-386 (2005)A secure and efficient authentication protocol for anonymous channel in wireless communications., , , and . Appl. Math. Comput., 169 (2): 1431-1439 (2005)Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards., , and . IEEE Trans. Consumer Electronics, 50 (2): 578-579 (2004)Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards., and . Int. J. Netw. Secur., 3 (3): 283-285 (2006)An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards., and . ACM SIGOPS Oper. Syst. Rev., 38 (3): 91-96 (2004)An improvement of the Yang-Shieh password authentication schemes., , and . Appl. Math. Comput., 162 (3): 1391-1396 (2005)Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks., and . IEICE Trans. Commun., 88-B (11): 4370-4372 (2005)A protected password change protocol, , and . CoRR, (2005)