Author of the publication

Password-Based Authentication: Preventing Dictionary Attacks

, and . IEEE Computer, 40 (6): 68 -- 74 (June 2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Salvaging route reply for on-demand routing protocols in mobile ad-hoc networks., and . MSWiM, page 53-62. ACM, (2005)Quasi-Synchronous Checkpointing: Models, Characterization, and Classification., and . IEEE Trans. Parallel Distributed Syst., 10 (7): 703-713 (1999)Guest Editors' Note., and . Pervasive Mob. Comput., 2 (2): 109-110 (2006)Checkpointing with mutable checkpoints., and . Theor. Comput. Sci., 290 (2): 1127-1148 (2003)Universal Constructs in Distributed Computations., and . Euro-Par, volume 1685 of Lecture Notes in Computer Science, page 795-805. Springer, (1999)Route Optimization in Mobile ATM Networks., , and . MobiCom, page 43-54. ACM, (1997)An adaptive distributed channel allocation strategy for mobile cellular networks., and . IPCCC, page 36-42. IEEE, (1999)Towards Energy-Fairness in LoRa Networks., , , , and . ICDCS, page 788-798. IEEE, (2019)Communication Patterns in Distributed Computations., and . J. Parallel Distributed Comput., 62 (6): 1104-1119 (2002)Efficient distributed snapshots in an anonymous asynchronous message-passing system., and . J. Parallel Distributed Comput., 73 (5): 621-629 (2013)