Author of the publication

Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords.

, , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 414-425. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contributions of climate and human activities to changes in runoff of the Yellow and Yangtze rivers from 1950 to 2008, , , , , and . 56 (8): 1398--1412 (2013)Response of Vegetation Coverage on Climate Change in Arid Mountain of Northwest China., , , and . IGARSS (3), page 569-572. IEEE, (2009)A case study of learning writing in service-learning through CMC., , , , , and . ICDIP, volume 8009 of SPIE Proceedings, page 80090R. SPIE, (2011)PCS: An Efficient Clustering Method for High-Dimensional Data., , and . DMIN, page 597-603. CSREA Press, (2008)Performance diagnosis of elite table tennis competition based on rough set theory., and . FSKD, page 55-60. IEEE, (2014)Computational simulation of transcranial current stimulation: Based on an image-derived head model., , , , and . BMEI, page 420-424. IEEE, (2014)Device-Free Localization With Multidimensional Wireless Link Information., , , , and . IEEE Trans. Vehicular Technology, 64 (1): 356-366 (2015)Solution Sets of Quadratic Complementarity Problems., , and . J. Optimization Theory and Applications, 176 (1): 120-136 (2018)Retrieval of land surface temperature from modis mid-infrared data., , , , and . IGARSS, page 4404-4407. IEEE, (2015)Instantly Decodable Network Coding for Multiple Unicast Retransmissions in Wireless Point-to-Multipoint Networks., , and . IEEE Trans. Vehicular Technology, 65 (8): 6232-6243 (2016)