Author of the publication

An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model.

, , , , and . Sci. China Inf. Sci., 60 (7): 72103 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks., , , , and . Wirel. Commun. Mob. Comput., (2018)A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing., , and . Fundam. Informaticae, 157 (1-2): 201-220 (2018)Attack on An ID-based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants., , and . Int. J. Netw. Secur., 18 (2): 393-396 (2016)Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings., , and . ICICA (LNCS), volume 6377 of Lecture Notes in Computer Science, page 135-142. Springer, (2010)Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting., , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 255-267. Springer, (2010)Anonymous gateway-oriented password-based authenticated key exchange based on RSA., , and . EURASIP J. Wireless Comm. and Networking, (2011)A provably secure password-based anonymous authentication scheme for wireless body area networks., , , , and . Comput. Electr. Eng., (2018)Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks., , , , and . Inf. Technol. Control., 45 (1): 62-70 (2016)A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems., , , , and . Inf. Technol. Control., 44 (2): 195-206 (2015)VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner., , , , , and . Peer-to-Peer Netw. Appl., 11 (2): 287-297 (2018)