From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure and efficient protection for HTTP cookies with self-verification., , , и . Int. J. Commun. Syst., (2019)Secure SAS-like password authentication schemes., , и . Comput. Stand. Interfaces, 27 (1): 25-31 (2004)Assigning Keys in a Hierarchy., , , и . IIH-MSP, стр. 1363-1366. IEEE Computer Society, (2008)Remarks on some signature schemes based on factoring and discrete logarithms., , и . Appl. Math. Comput., 169 (2): 1070-1075 (2005)Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks., , , и . Comput. Stand. Interfaces, 30 (1-2): 95-99 (2008)An S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart Meter., , , и . AINA Workshops, стр. 281-286. IEEE Computer Society, (2014)A Practical and Efficient Electronic Checkbook., , , и . J. Organ. Comput. Electron. Commer., 19 (4): 285-293 (2009)Security enhancement of a novel proxy key generation protocol., , , и . COMPSAC (2), стр. 681-688. IEEE Computer Society, (2007)978-0-7695-2870-0.A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding., , и . IIH-MSP, стр. 421-424. IEEE Computer Society, (2007)Compression-unimpaired batch-image encryption combining vector quantization and index compression., и . Inf. Sci., 180 (9): 1690-1701 (2010)