From post

Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards.

, , и . KES-AMSTA, том 4953 из Lecture Notes in Computer Science, стр. 850-857. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems., , , , и . Security and Management, стр. 547-553. CSREA Press, (2009)A Study on Security Risk Modeling over Information and Communication Infrastructure., , , и . Security and Management, стр. 249-253. CSREA Press, (2004)One-time self-certified public keys, revisited., , и . ICISC, стр. 59-69. Korea Institute of Information Security and Cryptology (KIISC), (1998)Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility Networks., , , и . MUSIC, том 274 из Lecture Notes in Electrical Engineering, стр. 535-540. Springer, (2013)Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme., , , и . IACR Cryptology ePrint Archive, (2011)A secure user-friendly authentication scheme with anonymity for wireless communications., , и . ICUIMC, стр. 110. ACM, (2013)Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards., , и . ISPEC, том 6047 из Lecture Notes in Computer Science, стр. 377-385. Springer, (2010)EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data., , , и . IDEAL, том 3578 из Lecture Notes in Computer Science, стр. 1-8. Springer, (2005)A Practical Analysis of Smartphone Security., , , и . HCI (11), том 6771 из Lecture Notes in Computer Science, стр. 311-320. Springer, (2011)An Improved Protocol for Server-Aided Authenticated Group Key Establishment., , , , и . ICCSA (5), том 6786 из Lecture Notes in Computer Science, стр. 437-446. Springer, (2011)