Author of the publication

Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames.

, , , , and . IEICE Transactions, 101-D (10): 2465-2473 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Many-to-one encryption and authentication scheme and its application., , and . Journal of Communications and Networks, 10 (1): 18-27 (2008)Cheating immune visual cryptography scheme., , and . IET Information Security, 5 (1): 51-59 (2011)Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings., , and . IACR Cryptology ePrint Archive, (2016)Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks., and . IACR Cryptology ePrint Archive, (2013)New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations., , , and . IACR Cryptology ePrint Archive, (2016)A Passive Client-based Approach to Detect Evil Twin Attacks., , , , , and . TrustCom/BigDataSE/ICESS, page 233-239. IEEE Computer Society, (2017)On the Security of Secure Server-Designation Public Key Encryption with Keyword Search., , , and . Comput. J., 61 (12): 1791-1793 (2018)Step construction of visual cryptography schemes., , and . IEEE Trans. Information Forensics and Security, 5 (1): 27-38 (2010)Certificateless public key encryption with equality test., , , , and . Inf. Sci., (2018)Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential., , , and . IACR Cryptology ePrint Archive, (2015)