Author of the publication

A Secret Key Based Authentication Scheme Using Smart Cards.

, , , and . Security and Management, page 65-71. CSREA Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation., and . ICIC (3), volume 2 of Communications in Computer and Information Science, page 1103-1109. Springer, (2007)A Reversible Data Hiding Scheme Using Even-Odd Embedding Method., , and . ICIC (2), volume 6216 of Lecture Notes in Computer Science, page 213-220. Springer, (2010)Robust Remote User Authentication Scheme., , and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 935-942. Springer, (2004)Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols., , and . ICCSA (1), volume 4705 of Lecture Notes in Computer Science, page 926-936. Springer, (2007)An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings., , and . ISPA, volume 4742 of Lecture Notes in Computer Science, page 446-456. Springer, (2007)Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem., and . Fundam. Informaticae, 87 (3-4): 483-492 (2008)Bit-serial AB2 Multiplier Using Modified Inner Product., , , and . J. Inf. Sci. Eng., 18 (4): 507-518 (2002)On the Security of Signature Scheme with Message Recovery and Its Application., and . Int. J. Netw. Secur., 3 (2): 151-154 (2006)An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (4): 850-853 (2010)Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA., , , and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 661-668. Springer, (2006)