Author of the publication

Secure Authentication Protocols Resistant to Guessing Attacks.

, , and . J. Inf. Sci. Eng., 22 (5): 1125-1143 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal information-dispersal for fault-tolerant communication over a burst-error channel., , and . IEEE Trans. Reliability, 52 (3): 354-366 (2003)A Comment on Ä Total Ordering Multicast Protocol Using Propagation Trees"., and . IEEE Trans. Parallel Distributed Syst., 8 (10): 1084 (1997)On Constructing Secret Sharing Schemes., and . INFOCOM, page 1288-1292. IEEE Computer Society, (1994)Secure Authentication Protocols Resistant to Guessing Attacks., , and . J. Inf. Sci. Eng., 22 (5): 1125-1143 (2006)Password authentication schemes with smart cards., and . Comput. Secur., 18 (8): 727-733 (1999)Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes., and . ACM Conference on Computer and Communications Security, page 153-156. ACM, (1996)Dynamic Load Balancing in Parallel Simulation Using Time Warp Mechanism., , and . ICPADS, page 222-229. IEEE Computer Society, (1994)A Distributed Fault-Tolerant Design for Multiple-Server VOD Systems., and . Multimedia Tools Appl., 8 (2): 219-247 (1999)Secret Sharing in Graph-Based Prohibited Structures., and . INFOCOM, page 718-724. IEEE Computer Society, (1997)SWOON: A Testbed for Secure Wireless Overlay Networks., , , , , , , , , and 6 other author(s). CSET, USENIX Association, (2008)