Author of the publication

Cryptanalysis of a modified remote user authentication scheme using smart cards.

, , , and . IEEE Trans. Consumer Electronics, 49 (4): 1243-1245 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A forensic chip for secure digital video recording., and . ISCAS, page 3068-3071. IEEE, (2010)Selective block assignment approach for robust digital image watermarking., and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 14-20. SPIE, (1999)Short-term load forecasting using lifting scheme and ARIMA models., and . Expert Syst. Appl., 38 (5): 5902-5911 (2011)A novel client service quality measuring model and an eHealthcare mitigating approach., , and . Int. J. Medical Informatics, (2016)Second-Generation RFID., , , , and . IEEE Secur. Priv., 6 (4): 21-27 (2008)Memoryless Hash-Based Perceptual Image Authentication., , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 425-434. Springer, (2012)Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks., and . Trans. Data Hiding Multim. Secur., (2015)Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition., , and . IEEE Trans. Inf. Forensics Secur., (2020)Development and behavioral pattern analysis of a mobile guide system with augmented reality for painting appreciation instruction in an art museum., , , , , and . Comput. Educ., (2014)Parameter estimation of chaotic systems by a nonlinear time-varying evolution PSO method., , , and . Artif. Life Robotics, 15 (1): 33-36 (2010)