From post

A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.

, , и . SEC, том 181 из IFIP, стр. 95-112. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey on Future Internet Security Architectures., , и . IEEE Access, (2016)SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications., , , , и . CODASPY, стр. 299-306. ACM, (2018)Encrypted Big Data Deduplication in Cloud Storage., , , , , и . Smart Data, Chapman and Hall/CRC, (2019)Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers., , и . ISPEC, том 4464 из Lecture Notes in Computer Science, стр. 177-192. Springer, (2007)VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples., , , , и . ESORICS (2), том 10493 из Lecture Notes in Computer Science, стр. 229-246. Springer, (2017)An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods., , и . ICISC, том 2015 из Lecture Notes in Computer Science, стр. 162-170. Springer, (2000)Secure the image-based simulated telesurgery system., , , и . ISCAS (2), стр. 596-599. IEEE, (2003)Expressive CP-ABE with partially hidden access structures., , и . AsiaCCS, стр. 18-19. ACM, (2012)Fortifying password authentication in integrated healthcare delivery systems., , и . AsiaCCS, стр. 255-265. ACM, (2006)Authenticable Data Analytics Over Encrypted Data in the Cloud., , , , и . IEEE Trans. Inf. Forensics Secur., (2023)