Author of the publication

Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards.

, , and . ISPEC, volume 6047 of Lecture Notes in Computer Science, page 377-385. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Factors affecting continuous purchase intention of fashion products on social E-commerce: SOR model and the mediating effect., and . Entertain. Comput., (2022)Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device., , , and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 241-247. Springer, (2012)Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting., , , and . KES-AMSTA, volume 4496 of Lecture Notes in Computer Science, page 616-625. Springer, (2007)Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security., , , , and . AHFE (9), volume 593 of Advances in Intelligent Systems and Computing, page 72-77. Springer, (2017)Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment., and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 164-172. Springer, (2009)Secure Deletion for Flash-Based Self-Encrypting Drives., , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 559-566. Springer, (2015)Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks., , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 7-13. Springer, (2015)Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure., , , and . IMCOM, page 1-4. IEEE, (2021)Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards., , and . KES-AMSTA, volume 4953 of Lecture Notes in Computer Science, page 850-857. Springer, (2008)Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS., , , and . IMCOM, page 1-8. IEEE, (2020)