Author of the publication

Secure Key Transfer Protocol Based on Secret Sharing for Group Communications.

, , , and . IEICE Trans. Inf. Syst., 94-D (11): 2069-2076 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A data-hiding scheme based on one-way hash function., , , and . Int. J. Multim. Intell. Secur., 1 (3): 285-297 (2010)An Improved Low Computation Cost User Authentication Scheme for Mobile Communication., , and . AINA, page 249-252. IEEE Computer Society, (2005)Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications., , and . IIH-MSP, page 902-904. IEEE Computer Society, (2009)Fully Deniable Message Authentication Protocols Preserving Confidentiality., , , and . Comput. J., 54 (10): 1688-1699 (2011)A Secure Single Sign-On Mechanism for Distributed Computer Networks., and . IEEE Trans. Ind. Electron., 59 (1): 629-637 (2012)An efficient e-mail protocol providing perfect forward secrecy for mobile devices., , and . Int. J. Commun. Syst., 23 (12): 1463-1473 (2010)Active versus Passive Malware Collection., , , , , and . Computer, 47 (4): 59-65 (2014)A Smart Card-based Authentication Scheme Using User Identify Cryptography., and . Int. J. Netw. Secur., 15 (2): 139-147 (2013)Secure Key Transfer Protocol Based on Secret Sharing for Group Communications., , , and . IEICE Trans. Inf. Syst., 94-D (11): 2069-2076 (2011)Three-phase behavior-based detection and classification of known and unknown malware., , , , and . Secur. Commun. Networks, 8 (11): 2004-2015 (2015)