Author of the publication

Secure Deletion for Flash-Based Self-Encrypting Drives.

, , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 559-566. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Factors affecting continuous purchase intention of fashion products on social E-commerce: SOR model and the mediating effect., and . Entertain. Comput., (2022)Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment., and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 164-172. Springer, (2009)Secure Deletion for Flash-Based Self-Encrypting Drives., , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 559-566. Springer, (2015)Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks., , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 7-13. Springer, (2015)Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device., , , and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 241-247. Springer, (2012)Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting., , , and . KES-AMSTA, volume 4496 of Lecture Notes in Computer Science, page 616-625. Springer, (2007)Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security., , , , and . AHFE (9), volume 593 of Advances in Intelligent Systems and Computing, page 72-77. Springer, (2017)Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS., , , and . IMCOM, page 1-8. IEEE, (2020)Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment., , and . HCI (11), volume 6771 of Lecture Notes in Computer Science, page 321-329. Springer, (2011)Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group., , , , and . HCI (11), volume 6771 of Lecture Notes in Computer Science, page 339-348. Springer, (2011)