From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques., , и . IJDSN, (2015)User centric three-factor authentication protocol for cloud-assisted wearable devices., , , , , и . Int. J. Commun. Syst., (2019)Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage., , , , и . Comput. Electr. Eng., (2016)A two-factor authenticated key exchange protocol based on RSA with dynamic passwords., , , и . Int. J. Embed. Syst., 7 (3/4): 257-265 (2015)A Risk Analysis Framework for Social Engineering Attack Based on User Profiling., , , , , и . J. Organ. End User Comput., 32 (3): 37-49 (2020)VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel., , , , , и . Peer-to-Peer Netw. Appl., 10 (4): 995-1007 (2017)Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms., , и . Secur. Commun. Networks, (2021)Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks., , , , и . Wirel. Commun. Mob. Comput., (2018)A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing., , и . Fundam. Informaticae, 157 (1-2): 201-220 (2018)Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting., , и . Inscrypt, том 6584 из Lecture Notes in Computer Science, стр. 255-267. Springer, (2010)