From post

An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module.

, и . Security and Management, стр. 408-413. CSREA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module., и . Security and Management, стр. 408-413. CSREA Press, (2004)High speed search for large-scale digital forensic investigation., , и . e-Forensics, стр. 31. ICST/ACM, (2008)Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function., , и . IEICE Trans. Commun., 98-B (7): 1276-1283 (2015)Subquadratic Space Complexity Multiplier Using Even Type GNB Based on Efficient Toeplitz Matrix-Vector Product., , , и . IEEE Trans. Computers, 67 (12): 1794-1805 (2018)Evaluating differentially private decision tree model over model inversion attack., , и . Int. J. Inf. Sec., 21 (3): 1-14 (2022)Data Randomization for Lightweight Secure Data Aggregation in Sensor Network., , , , и . UIC, том 5061 из Lecture Notes in Computer Science, стр. 338-351. Springer, (2008)Privacy in Location Based Services: Primitives Toward the Solution., , и . NCM (1), стр. 572-579. IEEE Computer Society, (2008)Authentication mechanism for fast handoff in cdma2000-WiBro interworking., , и . Sci. China Inf. Sci., 53 (1): 137-146 (2010)Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme., , и . CIS, том 4456 из Lecture Notes in Computer Science, стр. 427-434. Springer, (2006)Forensic Data Acquisition from Cell Phones using JTAG Interface., , и . Security and Management, стр. 410-414. CSREA Press, (2008)