From post

Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards.

, , и . ISPEC, том 6047 из Lecture Notes in Computer Science, стр. 377-385. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Deletion for Flash-Based Self-Encrypting Drives., , , , и . CSA/CUTE, том 373 из Lecture Notes in Electrical Engineering, стр. 559-566. Springer, (2015)Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks., , и . CSA/CUTE, том 373 из Lecture Notes in Electrical Engineering, стр. 7-13. Springer, (2015)Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment., и . ICCSA (2), том 5593 из Lecture Notes in Computer Science, стр. 164-172. Springer, (2009)Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device., , , и . ITCS, том 180 из Lecture Notes in Electrical Engineering, стр. 241-247. Springer, (2012)Factors affecting continuous purchase intention of fashion products on social E-commerce: SOR model and the mediating effect., и . Entertain. Comput., (2022)Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security., , , , и . AHFE (9), том 593 из Advances in Intelligent Systems and Computing, стр. 72-77. Springer, (2017)Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting., , , и . KES-AMSTA, том 4496 из Lecture Notes in Computer Science, стр. 616-625. Springer, (2007)Protection Profile for PoS (Point of Sale) System., , и . MUSIC, том 274 из Lecture Notes in Electrical Engineering, стр. 495-500. Springer, (2013)Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System., , и . GPC, том 7861 из Lecture Notes in Computer Science, стр. 796-802. Springer, (2013)Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group., , , , и . HCI (11), том 6771 из Lecture Notes in Computer Science, стр. 339-348. Springer, (2011)