Author of the publication

Two-factor mutual authentication based on smart cards and passwords.

, , , and . J. Comput. Syst. Sci., 74 (7): 1160-1172 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual-Texual Emotion Analysis With Deep Coupled Video and Danmu Neural Networks., , , , , and . IEEE Trans. Multim., 22 (6): 1634-1646 (2020)Finding Mixed Strategy Nash Equilibrium for Continuous Games through Deep Learning., , , and . CoRR, (2019)Lattice Embedding of Direction-Preserving Correspondence over Integrally Convex Set., and . AAIM, volume 4041 of Lecture Notes in Computer Science, page 53-63. Springer, (2006)Agent incentives of strategic behavior in resource exchange., , , , and . Discret. Appl. Math., (2019)Optimal reserve prices in weighted GSP auctions., , and . Electron. Commer. Res. Appl., 13 (3): 178-187 (2014)Text Distinguishers Used in an Interactive Meta Search Engine., , , , and . WAIM, volume 2419 of Lecture Notes in Computer Science, page 181-188. Springer, (2002)News impact on stock price return via sentiment analysis., , , , and . Knowl. Based Syst., (2014)Preemptive Scheduling of Parallel Jobs on Multiprocessors., , , and . SIAM J. Comput., 30 (1): 145-160 (2000)A Randomized Algorithm for the Voronoi Diagram of Line Segments on Coarse-Grained Multiprocessors., and . Algorithmica, 24 (3-4): 270-286 (1999)On Incentive Compatible Competitive Selection Protocols., , and . Algorithmica, 61 (2): 447-462 (2011)