From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protocols for purpose-restricted anonymous communications in IP-based wireless networks., , , и . Comput. Commun., 31 (15): 3662-3671 (2008)A New Security Architecture for Personal Networks., , , , , и . GLOBECOM, IEEE, (2006)New security layer for overlay networks., , и . J. Commun. Networks, 11 (3): 211-228 (2009)Authenticated key exchange for wireless security., , и . WCNC, стр. 1180-1186. IEEE, (2005)A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange., , и . EuroPKI, том 3545 из Lecture Notes in Computer Science, стр. 191-205. Springer, (2005)Simple Anonymous Password-Based Authenticated Key Exchange (SAPAKE), Reconsidered., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (2): 639-652 (2017)Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks., , и . IEICE Trans. Inf. Syst., 94-D (11): 2095-2110 (2011)An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 90-A (2): 474-490 (2007)A Strengthened PAKE Protocol with Identity-Based Encryption.. IEICE Trans. Inf. Syst., 105-D (11): 1900-1910 (ноября 2022)A Secure Network Storage System with Information Privacy., , и . WEWoRC, том P-74 из LNI, стр. 22-31. GI, (2005)