From post

Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards.

, , и . KES-AMSTA, том 4953 из Lecture Notes in Computer Science, стр. 850-857. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the security of a password-only authenticated three-party key exchange protocol., , , и . IACR Cryptology ePrint Archive, (2013)Association Rule Extraction from XML Stream Data for Wireless Sensor Networks., , , и . Sensors, 14 (7): 12937-12957 (2014)An improved key establishment scheme for wireless sensor network., , и . CFI, стр. 70-71. ACM, (2011)Malware Variant Detection and Classification Using Control Flow Graph., , и . ICHIT (2), том 206 из Communications in Computer and Information Science, стр. 174-181. Springer, (2011)Scalable Key Management for Dynamic Group in Multi-cast Communication., и . MUSIC, том 274 из Lecture Notes in Electrical Engineering, стр. 521-527. Springer, (2013)Security Analysis on a Group Key Transfer Protocol Based on Secret Sharing., , и . MUSIC, том 274 из Lecture Notes in Electrical Engineering, стр. 483-488. Springer, (2013)Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees., , , , , и . KES (1), том 4692 из Lecture Notes in Computer Science, стр. 672-679. Springer, (2007)Security Requirement of End Point Security Software., , и . GPC, том 7861 из Lecture Notes in Computer Science, стр. 788-795. Springer, (2013)Advanced Malware Variant Detection Algorithm Using Structural Characteristic of Executable File., , и . FGIT, том 7105 из Lecture Notes in Computer Science, стр. 301-308. Springer, (2011)Two efficient RSA multisignature schemes., , , и . ICICS, том 1334 из Lecture Notes in Computer Science, стр. 217-222. Springer, (1997)