Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the security of a password-only authenticated three-party key exchange protocol., , , and . IACR Cryptology ePrint Archive, (2013)Secure Group Communications over Combined Wired/Wireless Networks., , , and . IACR Cryptology ePrint Archive, (2004)Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees., , , , , and . KES (1), volume 4692 of Lecture Notes in Computer Science, page 672-679. Springer, (2007)Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data., , , and . J. Inf. Sci. Eng., 30 (3): 787-817 (2014)Fast Extraction of Maximal Frequent Subtrees Using Bits Representation., , , and . J. Inf. Sci. Eng., 25 (2): 435-464 (2009)Influence of Information Product Quality on Informing Users: A Web Portal Context.. Informing Sci. Int. J. an Emerg. Transdiscipl., (2016)Security weakness in a three-party pairing-based protocol for password authenticated key exchange., , , and . Inf. Sci., 177 (6): 1364-1375 (2007)Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (1): 213-218 (2006)An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 424-427 (2015)Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting., , , , and . Symmetry, 7 (1): 105-124 (2015)