Author of the publication

Two Efficient and Secure Authentication Schemes Using Smart Cards.

, , , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 858-866. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment., and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 164-172. Springer, (2009)Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting., , , and . KES-AMSTA, volume 4496 of Lecture Notes in Computer Science, page 616-625. Springer, (2007)Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device., , , and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 241-247. Springer, (2012)Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security., , , , and . AHFE (9), volume 593 of Advances in Intelligent Systems and Computing, page 72-77. Springer, (2017)Secure Deletion for Flash-Based Self-Encrypting Drives., , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 559-566. Springer, (2015)Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks., , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 7-13. Springer, (2015)Factors affecting continuous purchase intention of fashion products on social E-commerce: SOR model and the mediating effect., and . Entertain. Comput., (2022)Protection Profile for PoS (Point of Sale) System., , and . MUSIC, volume 274 of Lecture Notes in Electrical Engineering, page 495-500. Springer, (2013)Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System., , and . GPC, volume 7861 of Lecture Notes in Computer Science, page 796-802. Springer, (2013)Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group., , , , and . HCI (11), volume 6771 of Lecture Notes in Computer Science, page 339-348. Springer, (2011)