Author of the publication

Active User Authentication for Mobile Devices.

, , , and . WASA, volume 7405 of Lecture Notes in Computer Science, page 540-548. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A block-free TGDH key agreement protocol for secure group communications., and . Parallel and Distributed Computing and Networks, page 288-293. IASTED/ACTA Press, (2004)KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks., , and . ICC, page 1260-1265. IEEE, (2007)A New Approach to Weighted Multi-Secret Sharing., , , , , and . ICCCN, page 1-6. IEEE, (2011)Active User Authentication for Mobile Devices., , , and . WASA, volume 7405 of Lecture Notes in Computer Science, page 540-548. Springer, (2012)A taxonomy and comparison of remote voting schemes., , and . ICCCN, page 1-8. IEEE, (2014)An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy., , , , and . MSN, page 279-286. IEEE Computer Society, (2009)A New Scheme for Anonymous Secure Group Communication., , , , and . HICSS, page 1-9. IEEE Computer Society, (2011)An efficient and attack-resistant key agreement scheme for secure group communications in mobile ad-hoc networks., , , , and . Wirel. Commun. Mob. Comput., 8 (10): 1297-1312 (2008)Temporal coverage based content distribution in heterogeneous smart device networks., , and . ICC, page 3477-3482. IEEE, (2015)A privacy-preserving social-aware incentive system for word-of-mouth advertisement dissemination on smart mobile devices., , , and . SECON, page 596-604. IEEE, (2012)