Author of the publication

Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography.

, , and . CICSyN, page 332-335. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Dynamic Identity-Based Remote User Authentication Scheme., , and . ICDCIT, volume 5966 of Lecture Notes in Computer Science, page 224-235. Springer, (2010)SSO password-based multi-server authentication protocol., , and . Int. J. Commun. Networks Distributed Syst., 9 (1/2): 161-180 (2012)An Improved Processor Allocation Scheme for Mixed Parallel Task Graphs., , and . PDCS, page 140-145. ISCA, (2006)Identification of Nuclear Receptors and Its Family Using Wavelet Variance Features., , , , and . ICIT, page 68-73. IEEE Computer Society, (2007)Duplication-Based Scheduling Algorithm for Interconnection-Constrained Distributed Memory Machines., , and . HiPC, volume 2552 of Lecture Notes in Computer Science, page 52-62. Springer, (2002)Transport coefficients of multicomponent gas mixtures, , and . Physica A: Statistical and Theoretical Physics, 159 (3): 369--385 (Sep 1, 1989)A Bidirectional Heuristic Search Technique for Web Service Composition., , , and . ICCSA (4), volume 6019 of Lecture Notes in Computer Science, page 309-320. Springer, (2010)A Quad-Band Monopole Antenna for GPS and RFID Applications., , , and . RFID-TA, page 113-115. IEEE, (2021)Software Complexity for Computer Communication and Sensor Networks Using Binary Decision Diagrams., , , , and . Software Engineering Research and Practice, page 451-456. CSREA Press, (2008)Plane strain deformation of an initially unstressed elastic medium., , and . Appl. Math. Comput., 217 (21): 8683-8692 (2011)